{
  "CVE_data_type" : "CVE",
  "CVE_data_format" : "MITRE",
  "CVE_data_version" : "4.0",
  "CVE_data_numberOfCVEs" : "2528",
  "CVE_data_timestamp" : "2025-08-20T10:00Z",
  "CVE_Items" : [ {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9229",
        "ASSIGNER" : "productsecurity@teradyne-robotics.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://a.storyblok.com/f/230581/x/34a075d078/msa-17.pdf",
          "name" : "https://a.storyblok.com/f/230581/x/34a075d078/msa-17.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "name" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information disclosure vulnerability in error handling in MiR software prior to version 3.0.0 allows unauthenticated attackers to view detailed error information, such as file paths and other data, via access to verbose error pages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T09:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9228",
        "ASSIGNER" : "productsecurity@teradyne-robotics.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://a.storyblok.com/f/230581/x/46f48d3787/msa-15.pdf",
          "name" : "https://a.storyblok.com/f/230581/x/46f48d3787/msa-15.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "name" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MiR software versions prior to version 3.0.0 have insufficient authorization controls when creating text notes, \nallowing low-privilege users to create notes which are intended only for administrative users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T09:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5261",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0201",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0201",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authorization Bypass Through User-Controlled Key vulnerability in Pik Online Yazilim Çözümleri A.S. Pik Online allows Exploitation of Trusted Identifiers.This issue affects Pik Online: before 3.1.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-20T09:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5260",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0201",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0201",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-Side Request Forgery (SSRF) vulnerability in Pik Online Yazilim Çözümleri A.S. Pik Online allows Server Side Request Forgery.This issue affects Pik Online: before 3.1.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-20T09:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-39954",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/v6c96zygqx8xc2k3n2d59mgnm5txhkon",
          "name" : "https://lists.apache.org/thread/v6c96zygqx8xc2k3n2d59mgnm5txhkon",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-918 Server-Side Request Forgery (SSRF) in eventmesh-runtime module in WebhookUtil.java on windows\\linux\\mac os e.g. allows the attacker can abuse functionality on the server to read or update internal resources.\nUsers are recommended to upgrade to version 1.12.0 or use the master branch , which fixes this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T09:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9225",
        "ASSIGNER" : "productsecurity@teradyne-robotics.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://a.storyblok.com/f/230581/x/82d4989368/msa-14.pdf",
          "name" : "https://a.storyblok.com/f/230581/x/82d4989368/msa-14.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "name" : "https://supportportal.mobile-industrial-robots.com/documentation/mir-cybersecurity-guide/mir-cybersecurity-guide/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stored cross-site scripting (XSS) in the web interface of MiR software versions prior to 3.0.0 on MiR Robots and MiR Fleet allows execution of arbitrary JavaScript code in a victim’s browser"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55715",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/otter-blocks/vulnerability/wordpress-otter-gutenberg-block-plugin-3-1-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/otter-blocks/vulnerability/wordpress-otter-gutenberg-block-plugin-3-1-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Themeisle Otter - Gutenberg Block allows Retrieve Embedded Sensitive Data. This issue affects Otter - Gutenberg Block: from n/a through 3.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54750",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/funnel-builder/vulnerability/wordpress-funnel-builder-by-funnelkit-plugin-3-11-1-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/funnel-builder/vulnerability/wordpress-funnel-builder-by-funnelkit-plugin-3-11-1-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in FunnelKit Funnel Builder by FunnelKit allows PHP Local File Inclusion. This issue affects Funnel Builder by FunnelKit: from n/a through 3.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54735",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cubewp-framework/vulnerability/wordpress-cubewp-framework-plugin-1-1-24-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cubewp-framework/vulnerability/wordpress-cubewp-framework-plugin-1-1-24-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in Emraan Cheema CubeWP Framework allows Privilege Escalation. This issue affects CubeWP Framework: from n/a through 1.1.24."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54726",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jquery-archive-list-widget/vulnerability/wordpress-js-archive-list-plugin-6-1-6-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jquery-archive-list-widget/vulnerability/wordpress-js-archive-list-plugin-6-1-6-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List allows SQL Injection. This issue affects JS Archive List: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54713",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ecab-taxi-booking-manager/vulnerability/wordpress-taxi-booking-manager-for-woocommerce-plugin-1-3-0-broken-authentication-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ecab-taxi-booking-manager/vulnerability/wordpress-taxi-booking-manager-for-woocommerce-plugin-1-3-0-broken-authentication-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authentication Bypass Using an Alternate Path or Channel vulnerability in magepeopleteam Taxi Booking Manager for WooCommerce allows Authentication Abuse. This issue affects Taxi Booking Manager for WooCommerce: from n/a through 1.3.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54677",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-3-arbitrary-file-upload-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-wordpress-by-vcita-plugin-4-5-3-arbitrary-file-upload-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita allows Using Malicious Files. This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54670",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/oik/vulnerability/wordpress-oik-plugin-4-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/oik/vulnerability/wordpress-oik-plugin-4-15-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bobbingwide oik allows Reflected XSS. This issue affects oik: from n/a through 4.15.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54056",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-audio2-html5/vulnerability/wordpress-responsive-html5-audio-player-pro-with-playlist-3-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-audio2-html5/vulnerability/wordpress-responsive-html5-audio-player-pro-with-playlist-3-5-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Responsive HTML5 Audio Player PRO With Playlist allows Reflected XSS. This issue affects Responsive HTML5 Audio Player PRO With Playlist: from n/a through 3.5.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54055",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/druco/vulnerability/wordpress-druco-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/druco/vulnerability/wordpress-druco-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup Druco allows Reflected XSS. This issue affects Druco: from n/a through 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54053",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/groundhogg/vulnerability/wordpress-groundhogg-4-2-2-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/groundhogg/vulnerability/wordpress-groundhogg-4-2-2-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in Adrian Tobey Groundhogg allows Object Injection. This issue affects Groundhogg: from n/a through 4.2.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54052",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/real-estate-listing-realtyna-wpl/vulnerability/wordpress-realtyna-organic-idx-plugin-plugin-5-0-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/real-estate-listing-realtyna-wpl/vulnerability/wordpress-realtyna-organic-idx-plugin-plugin-5-0-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Realtyna Realtyna Organic IDX plugin allows PHP Local File Inclusion. This issue affects Realtyna Organic IDX plugin: from n/a through 5.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54049",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/custom-api-for-wp/vulnerability/wordpress-custom-api-for-wp-4-2-2-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/custom-api-for-wp/vulnerability/wordpress-custom-api-for-wp-4-2-2-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in miniOrange Custom API for WP allows Privilege Escalation. This issue affects Custom API for WP: from n/a through 4.2.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54048",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/custom-api-for-wp/vulnerability/wordpress-custom-api-for-wp-4-2-2-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/custom-api-for-wp/vulnerability/wordpress-custom-api-for-wp-4-2-2-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in miniOrange Custom API for WP allows SQL Injection. This issue affects Custom API for WP: from n/a through 4.2.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54046",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ql-cost-calculator/vulnerability/wordpress-cost-calculator-plugin-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ql-cost-calculator/vulnerability/wordpress-cost-calculator-plugin-7-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in QuanticaLabs Cost Calculator allows Stored XSS. This issue affects Cost Calculator: from n/a through 7.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54044",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/elite-video-player/vulnerability/wordpress-elite-video-player-10-0-5-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/elite-video-player/vulnerability/wordpress-elite-video-player-10-0-5-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in _CreativeMedia_ Elite Video Player allows Reflected XSS. This issue affects Elite Video Player: from n/a through 10.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54040",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/webba-booking-lite/vulnerability/wordpress-webba-booking-5-1-20-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/webba-booking-lite/vulnerability/wordpress-webba-booking-5-1-20-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Webba Appointment Booking Webba Booking allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Webba Booking: from n/a through 5.1.20."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54034",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/newsletters-lite/vulnerability/wordpress-newsletters-4-10-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/newsletters-lite/vulnerability/wordpress-newsletters-4-10-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Tribulant Software Newsletters allows PHP Local File Inclusion. This issue affects Newsletters: from n/a through 4.10."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54032",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/real-estate-manager-pro/vulnerability/wordpress-real-estate-manager-pro-plugin-12-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/real-estate-manager-pro/vulnerability/wordpress-real-estate-manager-pro-plugin-12-7-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WebCodingPlace Real Estate Manager Pro allows Reflected XSS. This issue affects Real Estate Manager Pro: from n/a through 12.7.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54031",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/supportboard/vulnerability/wordpress-support-board-3-8-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/supportboard/vulnerability/wordpress-support-board-3-8-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Schiocco Support Board allows PHP Local File Inclusion. This issue affects Support Board: from n/a through 3.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54028",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cf7-styler/vulnerability/wordpress-cf7-wow-styler-plugin-1-7-2-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cf7-styler/vulnerability/wordpress-cf7-wow-styler-plugin-1-7-2-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Saleswonder Team Tobias CF7 WOW Styler allows PHP Local File Inclusion. This issue affects CF7 WOW Styler: from n/a through 1.7.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54027",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/supportboard/vulnerability/wordpress-support-board-3-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/supportboard/vulnerability/wordpress-support-board-3-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Schiocco Support Board allows Reflected XSS. This issue affects Support Board: from n/a through 3.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54025",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/woo-coupon-usage/vulnerability/wordpress-coupon-affiliates-plugin-6-4-0-settings-change-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/woo-coupon-usage/vulnerability/wordpress-coupon-affiliates-plugin-6-4-0-settings-change-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Elliot Sowersby / RelyWP Coupon Affiliates allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Coupon Affiliates: from n/a through 6.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54021",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-file-list/vulnerability/wordpress-simple-file-list-6-1-14-arbitrary-file-download-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-file-list/vulnerability/wordpress-simple-file-list-6-1-14-arbitrary-file-download-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Mitchell Bennis Simple File List allows Path Traversal. This issue affects Simple File List: from n/a through 6.1.14."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54019",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/alone/vulnerability/wordpress-alone-7-8-5-arbitrary-code-execution-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/alone/vulnerability/wordpress-alone-7-8-5-arbitrary-code-execution-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in Bearsthemes Alone allows Code Injection. This issue affects Alone: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54017",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/paid-member-subscriptions/vulnerability/wordpress-paid-member-subscriptions-2-15-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/paid-member-subscriptions/vulnerability/wordpress-paid-member-subscriptions-2-15-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Cozmoslabs Paid Member Subscriptions allows PHP Local File Inclusion. This issue affects Paid Member Subscriptions: from n/a through 2.15.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54014",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/medicenter/vulnerability/wordpress-medicenter-health-medical-clinic-15-1-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/medicenter/vulnerability/wordpress-medicenter-health-medical-clinic-15-1-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in QuanticaLabs MediCenter - Health Medical Clinic allows Object Injection. This issue affects MediCenter - Health Medical Clinic: from n/a through 15.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54012",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/usc-e-shop/vulnerability/wordpress-welcart-e-commerce-plugin-2-11-16-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/usc-e-shop/vulnerability/wordpress-welcart-e-commerce-plugin-2-11-16-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in nanbu Welcart e-Commerce allows Object Injection. This issue affects Welcart e-Commerce: from n/a through 2.11.16."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54008",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-smart-filters/vulnerability/wordpress-jetsmartfilters-3-6-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-smart-filters/vulnerability/wordpress-jetsmartfilters-3-6-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetSmartFilters allows Retrieve Embedded Sensitive Data. This issue affects JetSmartFilters: from n/a through 3.6.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54007",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/post-grid/vulnerability/wordpress-post-grid-and-gutenberg-blocks-plugin-2-3-11-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/post-grid/vulnerability/wordpress-post-grid-and-gutenberg-blocks-plugin-2-3-11-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in PickPlugins Post Grid and Gutenberg Blocks allows Object Injection. This issue affects Post Grid and Gutenberg Blocks: from n/a through 2.3.11."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53998",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-woo-builder/vulnerability/wordpress-jetwoobuilder-2-1-20-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-woo-builder/vulnerability/wordpress-jetwoobuilder-2-1-20-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetWooBuilder allows Retrieve Embedded Sensitive Data. This issue affects JetWooBuilder: from n/a through 2.1.20."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53993",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-15-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-popup/vulnerability/wordpress-jetpopup-2-0-15-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetPopup allows Retrieve Embedded Sensitive Data. This issue affects JetPopup: from n/a through 2.0.15."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53992",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-tricks/vulnerability/wordpress-jettricks-1-5-4-1-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-tricks/vulnerability/wordpress-jettricks-1-5-4-1-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetTricks allows Retrieve Embedded Sensitive Data. This issue affects JetTricks: from n/a through 1.5.4.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53988",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-blocks/vulnerability/wordpress-jetblocks-for-elementor-1-3-18-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-blocks/vulnerability/wordpress-jetblocks-for-elementor-1-3-18-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetBlocks For Elementor allows Retrieve Embedded Sensitive Data. This issue affects JetBlocks For Elementor: from n/a through 1.3.18."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53987",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-menu/vulnerability/wordpress-jetmenu-2-4-11-1-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-menu/vulnerability/wordpress-jetmenu-2-4-11-1-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetMenu allows Retrieve Embedded Sensitive Data. This issue affects JetMenu: from n/a through 2.4.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53985",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-tabs/vulnerability/wordpress-jettabs-2-2-9-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-tabs/vulnerability/wordpress-jettabs-2-2-9-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetTabs allows Retrieve Embedded Sensitive Data. This issue affects JetTabs: from n/a through 2.2.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53983",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-elements/vulnerability/wordpress-jetelements-for-elementor-2-7-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-elements/vulnerability/wordpress-jetelements-for-elementor-2-7-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetElements For Elementor allows Retrieve Embedded Sensitive Data. This issue affects JetElements For Elementor: from n/a through 2.7.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53580",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-business-directory-pro/vulnerability/wordpress-simple-business-directory-pro-plugin-15-6-9-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-business-directory-pro/vulnerability/wordpress-simple-business-directory-pro-plugin-15-6-9-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in quantumcloud Simple Business Directory Pro allows Privilege Escalation. This issue affects Simple Business Directory Pro: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53577",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/global-dns/vulnerability/wordpress-global-dns-plugin-3-1-0-remote-code-execution-rce-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/global-dns/vulnerability/wordpress-global-dns-plugin-3-1-0-remote-code-execution-rce-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in thehp Global DNS allows Remote Code Inclusion. This issue affects Global DNS: from n/a through 3.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53567",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ghostkit/vulnerability/wordpress-ghost-kit-3-4-1-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ghostkit/vulnerability/wordpress-ghost-kit-3-4-1-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in nK Ghost Kit allows PHP Local File Inclusion. This issue affects Ghost Kit: from n/a through 3.4.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53565",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/business-reviews-wp/vulnerability/wordpress-widget-for-google-reviews-1-0-15-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/business-reviews-wp/vulnerability/wordpress-widget-for-google-reviews-1-0-15-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RadiusTheme Widget for Google Reviews allows PHP Local File Inclusion. This issue affects Widget for Google Reviews: from n/a through 1.0.15."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53564",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg_radio_player_addon_visual_composer/vulnerability/wordpress-html5-radio-player-wpbakery-page-builder-addon-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg_radio_player_addon_visual_composer/vulnerability/wordpress-html5-radio-player-wpbakery-page-builder-addon-2-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup HTML5 Radio Player - WPBakery Page Builder Addon allows Reflected XSS. This issue affects HTML5 Radio Player - WPBakery Page Builder Addon: from n/a through 2.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53563",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/video_player_youtube_vimeo/vulnerability/wordpress-youtube-vimeo-video-player-and-slider-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/video_player_youtube_vimeo/vulnerability/wordpress-youtube-vimeo-video-player-and-slider-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Youtube Vimeo Video Player and Slider allows Reflected XSS. This issue affects Youtube Vimeo Video Player and Slider: from n/a through 3.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53562",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg_universal_video_player_addon_visual_composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg_universal_video_player_addon_visual_composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player - Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Universal Video Player - Addon for WPBakery Page Builder: from n/a through 3.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53561",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-35"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/prevent-file-access/vulnerability/wordpress-prevent-files-folders-access-plugin-2-6-0-path-traversal-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/prevent-file-access/vulnerability/wordpress-prevent-files-folders-access-plugin-2-6-0-path-traversal-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Path Traversal vulnerability in miniOrange Prevent files / folders access allows Path Traversal. This issue affects Prevent files / folders access: from n/a through 2.6.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53560",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/noisa/vulnerability/wordpress-noisa-2-6-0-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/noisa/vulnerability/wordpress-noisa-2-6-0-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in rascals Noisa allows Object Injection. This issue affects Noisa: from n/a through 2.6.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53559",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-universal-video-player-addon-visual-composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability-3?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-universal-video-player-addon-visual-composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability-3?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player - Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Universal Video Player - Addon for WPBakery Page Builder: from n/a through 3.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53319",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/adthrive-ads/vulnerability/wordpress-raptive-ads-plugin-3-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/adthrive-ads/vulnerability/wordpress-raptive-ads-plugin-3-8-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Raptive Raptive Ads allows Reflected XSS. This issue affects Raptive Ads: from n/a through 3.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53299",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/tmm_content_composer/vulnerability/wordpress-thememakers-visual-content-composer-plugin-1-5-8-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/tmm_content_composer/vulnerability/wordpress-thememakers-visual-content-composer-plugin-1-5-8-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in ThemeMakers ThemeMakers Visual Content Composer allows Object Injection. This issue affects ThemeMakers Visual Content Composer: from n/a through 1.5.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53226",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/comments-capcha-box/vulnerability/wordpress-comments-capcha-box-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/comments-capcha-box/vulnerability/wordpress-comments-capcha-box-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in digitalzoomstudio Comments Capcha Box allows Reflected XSS. This issue affects Comments Capcha Box: from n/a through 1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53213",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/elex-reachship-multi-carrier-conditional-shipping/vulnerability/wordpress-reachship-woocommerce-multi-carrier-conditional-shipping-4-3-1-arbitrary-file-upload-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/elex-reachship-multi-carrier-conditional-shipping/vulnerability/wordpress-reachship-woocommerce-multi-carrier-conditional-shipping-4-3-1-arbitrary-file-upload-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type vulnerability in ELEXtensions ReachShip WooCommerce Multi-Carrier & Conditional Shipping allows Using Malicious Files. This issue affects ReachShip WooCommerce Multi-Carrier & Conditional Shipping: from n/a through 4.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53212",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/revolution-video-player/vulnerability/wordpress-revolution-video-player-with-bottom-playlist-2-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/revolution-video-player/vulnerability/wordpress-revolution-video-player-with-bottom-playlist-2-9-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Revolution Video Player With Bottom Playlist allows Reflected XSS. This issue affects Revolution Video Player With Bottom Playlist: from n/a through 2.9.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53210",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/zoloblocks/vulnerability/wordpress-zoloblocks-plugin-2-3-2-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/zoloblocks/vulnerability/wordpress-zoloblocks-plugin-2-3-2-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in bdthemes ZoloBlocks allows PHP Local File Inclusion. This issue affects ZoloBlocks: from n/a through 2.3.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53208",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/paymaya-checkout-for-woocommerce/vulnerability/wordpress-maya-business-1-2-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/paymaya-checkout-for-woocommerce/vulnerability/wordpress-maya-business-1-2-0-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authorization Bypass Through User-Controlled Key vulnerability in paymayapg Maya Business allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Maya Business: from n/a through 1.2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53207",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-travel-blocks/vulnerability/wordpress-wp-travel-gutenberg-blocks-3-9-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-travel-blocks/vulnerability/wordpress-wp-travel-gutenberg-blocks-3-9-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Travel WP Travel Gutenberg Blocks allows PHP Local File Inclusion. This issue affects WP Travel Gutenberg Blocks: from n/a through 3.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53205",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-audio4-html5-shoutcast/vulnerability/wordpress-radio-player-shoutcast-icecast-4-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-audio4-html5-shoutcast/vulnerability/wordpress-radio-player-shoutcast-icecast-4-4-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Radio Player Shoutcast & Icecast allows Reflected XSS. This issue affects Radio Player Shoutcast & Icecast: from n/a through 4.4.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53204",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/eventlist/vulnerability/wordpress-eventlist-1-9-2-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/eventlist/vulnerability/wordpress-eventlist-1-9-2-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ovatheme eventlist allows PHP Local File Inclusion. This issue affects eventlist: from n/a through 1.9.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53201",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/noo-jobmonster/vulnerability/wordpress-jobmonster-4-7-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/noo-jobmonster/vulnerability/wordpress-jobmonster-4-7-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in NooTheme Jobmonster allows Reflected XSS. This issue affects Jobmonster: from n/a through 4.7.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53198",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-4-0-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-4-0-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in favethemes Houzez allows PHP Local File Inclusion. This issue affects Houzez: from n/a through 4.0.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53196",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-3-7-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-3-7-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Crocoblock JetEngine allows Retrieve Embedded Sensitive Data. This issue affects JetEngine: from n/a through 3.7.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53195",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-plugin-3-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-plugin-3-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetEngine allows Stored XSS. This issue affects JetEngine: from n/a through 3.7.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53194",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1336"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-3-7-0-remote-code-execution-rce-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-3-7-0-remote-code-execution-rce-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements Used in a Template Engine vulnerability in Crocoblock JetEngine allows Code Injection. This issue affects JetEngine: from n/a through 3.7.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49896",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-discord-post-plus/vulnerability/wordpress-wp-discord-post-plus-supports-unlimited-channels-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-discord-post-plus/vulnerability/wordpress-wp-discord-post-plus-supports-unlimited-channels-plugin-1-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in wptasker WP Discord Post Plus &#8211;  Supports Unlimited Channels allows Cross Site Request Forgery. This issue affects WP Discord Post Plus &#8211;  Supports Unlimited Channels: from n/a through 1.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49894",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-emmet/vulnerability/wordpress-wp-emmet-plugin-0-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-emmet/vulnerability/wordpress-wp-emmet-plugin-0-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in rewish WP Emmet allows Stored XSS. This issue affects WP Emmet: from n/a through 0.3.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49893",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/elizaibot-chatbots/vulnerability/wordpress-elizaibots-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/elizaibot-chatbots/vulnerability/wordpress-elizaibots-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in liseperu Elizaibots allows Stored XSS. This issue affects Elizaibots: from n/a through 1.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49892",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/pending-order-bot/vulnerability/wordpress-pending-order-bot-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/pending-order-bot/vulnerability/wordpress-pending-order-bot-plugin-1-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in badasswp Pending Order Bot allows Stored XSS. This issue affects Pending Order Bot: from n/a through 1.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49891",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-contact-info-widget/vulnerability/wordpress-contact-info-widget-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-contact-info-widget/vulnerability/wordpress-contact-info-widget-plugin-2-6-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in riotweb Contact Info Widget allows Stored XSS. This issue affects Contact Info Widget: from n/a through 2.6.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49890",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/awstats-script/vulnerability/wordpress-awstats-script-plugin-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/awstats-script/vulnerability/wordpress-awstats-script-plugin-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Jorge Garcia de Bustos AWStats Script allows Stored XSS. This issue affects AWStats Script: from n/a through 0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49889",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/customcomment/vulnerability/wordpress-custom-comment-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/customcomment/vulnerability/wordpress-custom-comment-plugin-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in imaprogrammer Custom Comment allows Stored XSS. This issue affects Custom Comment: from n/a through 2.1.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49438",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-login-log/vulnerability/wordpress-simple-login-log-plugin-1-1-3-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-login-log/vulnerability/wordpress-simple-login-log-plugin-1-1-3-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in Max Chirkov Simple Login Log allows Object Injection. This issue affects Simple Login Log: from n/a through 1.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49436",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/custom-menu/vulnerability/wordpress-custom-menu-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/custom-menu/vulnerability/wordpress-custom-menu-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in thiudis Custom Menu allows Stored XSS. This issue affects Custom Menu: from n/a through 1.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49434",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/laposta-woocommerce/vulnerability/wordpress-laposta-woocommerce-plugin-1-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/laposta-woocommerce/vulnerability/wordpress-laposta-woocommerce-plugin-1-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in stijnvanderree Laposta WooCommerce allows Stored XSS. This issue affects Laposta WooCommerce: from n/a through 1.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49428",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cookie-warning/vulnerability/wordpress-cookie-warning-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cookie-warning/vulnerability/wordpress-cookie-warning-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Dourou Cookie Warning allows Stored XSS. This issue affects Cookie Warning: from n/a through 1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49426",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cookie-warning/vulnerability/wordpress-cookie-warning-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cookie-warning/vulnerability/wordpress-cookie-warning-plugin-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Dourou Cookie Warning allows Cross Site Request Forgery. This issue affects Cookie Warning: from n/a through 1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49424",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/animated-icon-banner-for-visual-composer/vulnerability/wordpress-essential-doo-components-for-visual-composer-plugin-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/animated-icon-banner-for-visual-composer/vulnerability/wordpress-essential-doo-components-for-visual-composer-plugin-1-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in diego.benna Essential Doo Components for Visual Composer allows DOM-Based XSS. This issue affects Essential Doo Components for Visual Composer: from n/a through 1.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49422",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/iframe-wrapper/vulnerability/wordpress-iframe-wrapper-plugin-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/iframe-wrapper/vulnerability/wordpress-iframe-wrapper-plugin-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Aelora iframe Wrapper allows DOM-Based XSS. This issue affects iframe Wrapper: from n/a through 0.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49420",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/markup-markdown/vulnerability/wordpress-markup-markdown-plugin-3-20-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/markup-markdown/vulnerability/wordpress-markup-markdown-plugin-3-20-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Pierre-Henri Lavigne Markup Markdown allows Stored XSS. This issue affects Markup Markdown: from n/a through 3.20.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49413",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/terms-of-service-and-privacy-policy/vulnerability/wordpress-terms-of-service-privacy-policy-generator-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/terms-of-service-and-privacy-policy/vulnerability/wordpress-terms-of-service-privacy-policy-generator-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wishloop Terms of Service &amp; Privacy Policy Generator allows Stored XSS. This issue affects Terms of Service &amp; Privacy Policy Generator: from n/a through 1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49412",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/page-transition/vulnerability/wordpress-page-transition-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/page-transition/vulnerability/wordpress-page-transition-plugin-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in numixtech Page Transition allows Stored XSS. This issue affects Page Transition: from n/a through 1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49411",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/iframe-block/vulnerability/wordpress-iframe-block-plugin-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/iframe-block/vulnerability/wordpress-iframe-block-plugin-0-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Vikas Sharma iFrame Block allows Stored XSS. This issue affects iFrame Block: from n/a through 0.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49410",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/tc-testimonial/vulnerability/wordpress-tc-testimonials-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/tc-testimonial/vulnerability/wordpress-tc-testimonials-plugin-1-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Imran Emu TC Testimonials allows Stored XSS. This issue affects TC Testimonials: from n/a through 1.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49409",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/sensorpress-uptime-monitoring/vulnerability/wordpress-sensorpress-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/sensorpress-uptime-monitoring/vulnerability/wordpress-sensorpress-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in brewlabs SensorPress allows Stored XSS. This issue affects SensorPress: from n/a through 1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49408",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/templately/vulnerability/wordpress-templately-plugin-3-2-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/templately/vulnerability/wordpress-templately-plugin-3-2-7-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in WPDeveloper Templately allows Retrieve Embedded Sensitive Data. This issue affects Templately: from n/a through 3.2.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49406",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-theme-4-1-1-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/houzez/vulnerability/wordpress-houzez-theme-4-1-1-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in favethemes Houzez allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Houzez: from n/a through 4.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49400",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-stats-manager/vulnerability/wordpress-wp-visitor-statistics-real-time-traffic-plugin-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-stats-manager/vulnerability/wordpress-wp-visitor-statistics-real-time-traffic-plugin-8-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in osama.esh WP Visitor Statistics (Real Time Traffic) allows Stored XSS. This issue affects WP Visitor Statistics (Real Time Traffic): from n/a through 8.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49399",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/nex-forms-express-wp-form-builder/vulnerability/wordpress-nex-forms-plugin-9-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/nex-forms-express-wp-form-builder/vulnerability/wordpress-nex-forms-plugin-9-1-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Basix NEX-Forms allows Cross Site Request Forgery. This issue affects NEX-Forms: from n/a through 9.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49397",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-colorbox/vulnerability/wordpress-colorbox-lightbox-plugin-1-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-colorbox/vulnerability/wordpress-colorbox-lightbox-plugin-1-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Colorbox Lightbox allows Stored XSS. This issue affects Colorbox Lightbox: from n/a through 1.1.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49396",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/themify-builder/vulnerability/wordpress-themify-builder-plugin-7-6-7-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/themify-builder/vulnerability/wordpress-themify-builder-plugin-7-6-7-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in themifyme Themify Builder allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Themify Builder: from n/a through 7.6.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49395",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/themify-icons/vulnerability/wordpress-themify-icons-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/themify-icons/vulnerability/wordpress-themify-icons-plugin-2-0-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themifyme Themify Icons allows Stored XSS. This issue affects Themify Icons: from n/a through 2.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49392",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/themify-audio-dock/vulnerability/wordpress-themify-audio-dock-plugin-2-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/themify-audio-dock/vulnerability/wordpress-themify-audio-dock-plugin-2-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themifyme Themify Audio Dock allows Stored XSS. This issue affects Themify Audio Dock: from n/a through 2.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49391",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/sign-up-sheets/vulnerability/wordpress-sign-up-sheets-plugin-2-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/sign-up-sheets/vulnerability/wordpress-sign-up-sheets-plugin-2-3-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Fetch Designs Sign-up Sheets allows Cross Site Request Forgery. This issue affects Sign-up Sheets: from n/a through 2.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49389",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/notice-bar/vulnerability/wordpress-notice-bar-plugin-3-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/notice-bar/vulnerability/wordpress-notice-bar-plugin-3-1-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WEN Solutions Notice Bar allows Stored XSS. This issue affects Notice Bar: from n/a through 3.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49382",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/jobzilla/vulnerability/wordpress-jobzilla-job-board-wordpress-theme-theme-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/jobzilla/vulnerability/wordpress-jobzilla-job-board-wordpress-theme-theme-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in DexignZone JobZilla - Job Board WordPress Theme allows Privilege Escalation. This issue affects JobZilla - Job Board WordPress Theme: from n/a through 2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49381",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/adstxt-guru-connect/vulnerability/wordpress-ads-txt-guru-connect-plugin-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/adstxt-guru-connect/vulnerability/wordpress-ads-txt-guru-connect-plugin-1-1-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in ads.txt Guru ads.txt Guru Connect allows Cross Site Request Forgery. This issue affects ads.txt Guru Connect: from n/a through 1.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48302",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-fundraising-donation/vulnerability/wordpress-fundengine-plugin-1-7-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-fundraising-donation/vulnerability/wordpress-fundengine-plugin-1-7-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Roxnor FundEngine allows PHP Local File Inclusion. This issue affects FundEngine: from n/a through 1.7.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48298",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/seopress-for-mainwp/vulnerability/wordpress-seopress-for-mainwp-1-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/seopress-for-mainwp/vulnerability/wordpress-seopress-for-mainwp-1-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Benjamin Denis SEOPress for MainWP allows PHP Local File Inclusion. This issue affects SEOPress for MainWP: from n/a through 1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48297",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/qc-simple-link-directory/vulnerability/wordpress-simple-link-directory-14-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/qc-simple-link-directory/vulnerability/wordpress-simple-link-directory-14-8-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in quantumcloud Simple Link Directory allows Reflected XSS. This issue affects Simple Link Directory: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48296",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/upstore/vulnerability/wordpress-upstore-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/upstore/vulnerability/wordpress-upstore-1-7-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in skygroup UpStore allows Reflected XSS. This issue affects UpStore: from n/a through 1.7.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48171",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/cena/vulnerability/wordpress-cena-store-2-11-26-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/cena/vulnerability/wordpress-cena-store-2-11-26-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Cena Store allows PHP Local File Inclusion. This issue affects Cena Store: from n/a through 2.11.26."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48170",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-universal-video-player-addon-visual-composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-universal-video-player-addon-visual-composer/vulnerability/wordpress-universal-video-player-addon-for-wpbakery-page-builder-3-2-1-cross-site-scripting-xss-vulnerability-2?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Universal Video Player - Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Universal Video Player - Addon for WPBakery Page Builder: from n/a through 3.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48169",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/code-engine/vulnerability/wordpress-code-engine-plugin-0-3-3-remote-code-execution-rce-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/code-engine/vulnerability/wordpress-code-engine-plugin-0-3-3-remote-code-execution-rce-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in Jordy Meow Code Engine allows Remote Code Inclusion. This issue affects Code Engine: from n/a through 0.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48168",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-audio5-html5-shoutcast-sticky/vulnerability/wordpress-apollo-sticky-full-width-html5-audio-player-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-audio5-html5-shoutcast-sticky/vulnerability/wordpress-apollo-sticky-full-width-html5-audio-player-3-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Apollo - Sticky Full Width HTML5 Audio Player allows Reflected XSS. This issue affects Apollo - Sticky Full Width HTML5 Audio Player: from n/a through 3.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48165",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/delucks-seo/vulnerability/wordpress-delucks-seo-plugin-2-6-0-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/delucks-seo/vulnerability/wordpress-delucks-seo-plugin-2-6-0-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in DELUCKS DELUCKS SEO allows Privilege Escalation. This issue affects DELUCKS SEO: from n/a through 2.6.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48164",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/suredash/vulnerability/wordpress-suredash-1-0-3-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/suredash/vulnerability/wordpress-suredash-1-0-3-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in Brainstorm Force SureDash allows Privilege Escalation. This issue affects SureDash: from n/a through 1.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48163",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg-audio8-html5-radio-ads/vulnerability/wordpress-shout-html5-radio-player-with-ads-shoutcast-and-icecast-support-3-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg-audio8-html5-radio-ads/vulnerability/wordpress-shout-html5-radio-player-with-ads-shoutcast-and-icecast-support-3-5-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup SHOUT - HTML5 Radio Player With Ads - ShoutCast and IceCast Support allows Reflected XSS. This issue affects SHOUT - HTML5 Radio Player With Ads - ShoutCast and IceCast Support: from n/a through 3.5.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48162",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-business-directory-pro/vulnerability/wordpress-simple-business-directory-pro-15-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-business-directory-pro/vulnerability/wordpress-simple-business-directory-pro-15-5-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in quantumcloud Simple Business Directory Pro allows Reflected XSS. This issue affects Simple Business Directory Pro: from n/a through 15.5.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48160",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/caliris-wp/vulnerability/wordpress-caliris-1-5-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/caliris-wp/vulnerability/wordpress-caliris-1-5-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in CocoBasic Caliris allows PHP Local File Inclusion. This issue affects Caliris: from n/a through 1.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48159",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/video-player-youtube-vimeo/vulnerability/wordpress-youtube-vimeo-video-player-and-slider-wp-plugin-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/video-player-youtube-vimeo/vulnerability/wordpress-youtube-vimeo-video-player-and-slider-wp-plugin-3-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Youtube Vimeo Video Player and Slider WP Plugin allows Reflected XSS. This issue affects Youtube Vimeo Video Player and Slider WP Plugin: from n/a through 3.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48158",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/buddypress-xprofile-image-field/vulnerability/wordpress-buddypress-xprofile-custom-image-field-plugin-3-0-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/buddypress-xprofile-image-field/vulnerability/wordpress-buddypress-xprofile-custom-image-field-plugin-3-0-1-arbitrary-file-deletion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Alex Githatu BuddyPress XProfile Custom Image Field allows Path Traversal. This issue affects BuddyPress XProfile Custom Image Field: from n/a through 3.0.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48157",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/formality/vulnerability/wordpress-formality-1-5-9-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/formality/vulnerability/wordpress-formality-1-5-9-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Michele Giorgi Formality allows PHP Local File Inclusion. This issue affects Formality: from n/a through 1.5.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48154",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg_vp_youtube_vimeo_addon_visual_composer/vulnerability/wordpress-multimedia-playlist-slider-addon-for-wpbakery-page-builder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg_vp_youtube_vimeo_addon_visual_composer/vulnerability/wordpress-multimedia-playlist-slider-addon-for-wpbakery-page-builder-plugin-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Multimedia Playlist Slider Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Multimedia Playlist Slider Addon for WPBakery Page Builder: from n/a through 2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48152",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/rentsyst/vulnerability/wordpress-rentsyst-plugin-2-0-100-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/rentsyst/vulnerability/wordpress-rentsyst-plugin-2-0-100-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in dimafreund Rentsyst allows Reflected XSS. This issue affects Rentsyst: from n/a through 2.0.100."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48151",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cm-map-locations/vulnerability/wordpress-cm-map-locations-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cm-map-locations/vulnerability/wordpress-cm-map-locations-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM Map Locations allows Reflected XSS. This issue affects CM Map Locations: from n/a through 2.1.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48149",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/cookandmeal/vulnerability/wordpress-cook-meal-1-2-3-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/cookandmeal/vulnerability/wordpress-cook-meal-1-2-3-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in dedalx Cook&Meal allows PHP Local File Inclusion. This issue affects Cook&Meal: from n/a through 1.2.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48148",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/storekeeper-for-woocommerce/vulnerability/wordpress-storekeeper-for-woocommerce-plugin-14-4-4-arbitrary-file-upload-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/storekeeper-for-woocommerce/vulnerability/wordpress-storekeeper-for-woocommerce-plugin-14-4-4-arbitrary-file-upload-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type vulnerability in StoreKeeper B.V. StoreKeeper for WooCommerce allows Using Malicious Files. This issue affects StoreKeeper for WooCommerce: from n/a through 14.4.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48142",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/bookify/vulnerability/wordpress-bookify-1-0-9-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/bookify/vulnerability/wordpress-bookify-1-0-9-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in Saad Iqbal Bookify allows Privilege Escalation. This issue affects Bookify: from n/a through 1.0.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47650",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/infility-global/vulnerability/wordpress-infility-global-2-11-2-arbitrary-file-download-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/infility-global/vulnerability/wordpress-infility-global-2-11-2-arbitrary-file-download-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Infility Infility Global allows Path Traversal. This issue affects Infility Global: from n/a through 2.14.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30975",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/add-custom-codes/vulnerability/wordpress-add-custom-codes-4-80-arbitrary-code-execution-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/add-custom-codes/vulnerability/wordpress-add-custom-codes-4-80-arbitrary-code-execution-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in SaifuMak Add Custom Codes allows Code Injection. This issue affects Add Custom Codes: from n/a through 4.80."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28977",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-plugin-1-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThimPress WP Pipes allows Reflected XSS. This issue affects WP Pipes: from n/a through 1.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T08:15Z",
    "lastModifiedDate" : "2025-08-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9202",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://research.cleantalk.org/CVE-2025-9202",
          "name" : "https://research.cleantalk.org/CVE-2025-9202",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://themes.trac.wordpress.org/changeset/283558/colormag/4.0.20/inc/admin/class-colormag-welcome-notice.php",
          "name" : "https://themes.trac.wordpress.org/changeset/283558/colormag/4.0.20/inc/admin/class-colormag-welcome-notice.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1922b16-e76c-4ee6-83ad-77970c8c25c0?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b1922b16-e76c-4ee6-83ad-77970c8c25c0?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ColorMag theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the welcome_notice_import_handler() function in all versions up to, and including, 4.0.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the ThemeGrill Demo Importer plugin."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-20T07:15Z",
    "lastModifiedDate" : "2025-08-20T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8618",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/woo-smart-quick-view/trunk/wpc-smart-quick-view.php#L545",
          "name" : "https://plugins.trac.wordpress.org/browser/woo-smart-quick-view/trunk/wpc-smart-quick-view.php#L545",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3346074/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3346074/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/woo-smart-quick-view",
          "name" : "https://wordpress.org/plugins/woo-smart-quick-view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d8b2ec1-a76b-42df-8540-4aecaa35efd3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d8b2ec1-a76b-42df-8540-4aecaa35efd3?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPC Smart Quick View for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's woosq_btn shortcode in all versions up to, and including, 4.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-20T05:15Z",
    "lastModifiedDate" : "2025-08-20T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55706",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/jp/JVN76729865/",
          "name" : "https://jvn.jp/en/jp/JVN76729865/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://movabletype.org/news/2025/08/mt-843-released.html",
          "name" : "https://movabletype.org/news/2025/08/mt-843-released.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "URL redirection to untrusted site ('Open Redirect')  issue exists in Movable Type. If this vulnerability is exploited, an invalid parameter may be inserted into the password reset page, which may lead to redirection to an arbitrary URL."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T05:15Z",
    "lastModifiedDate" : "2025-08-20T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54551",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-472"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://healthcaresolutions-us.fujifilm.com/synapse-mobility-vulnerability-notification",
          "name" : "https://healthcaresolutions-us.fujifilm.com/synapse-mobility-vulnerability-notification",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://jvn.jp/en/vu/JVNVU94286093/",
          "name" : "https://jvn.jp/en/vu/JVNVU94286093/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Synapse Mobility 8.0, 8.0.1, 8.0.2, 8.1, and 8.1.1 contain a privilege escalation vulnerability through external control of Web parameter. If exploited, a user of the product may escalate the privilege and access data that the user do not have permission to view by altering the parameters of the search function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T05:15Z",
    "lastModifiedDate" : "2025-08-20T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53522",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-348"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/jp/JVN76729865/",
          "name" : "https://jvn.jp/en/jp/JVN76729865/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://movabletype.org/news/2025/08/mt-843-released.html",
          "name" : "https://movabletype.org/news/2025/08/mt-843-released.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Movable Type contains an issue with use of less trusted source. If exploited, tampered email to reset a password may be sent by a remote unauthenticated attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T05:15Z",
    "lastModifiedDate" : "2025-08-20T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57791",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-88"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_1.html",
          "name" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Commvault before 11.36.60. A security vulnerability has been identified that allows remote attackers to inject or manipulate command-line arguments passed to internal components due to insufficient input validation. Successful exploitation results in a valid user session for a low privilege role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57790",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-36"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html",
          "name" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_2.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Commvault before 11.36.60. A security vulnerability has been identified that allows remote attackers to perform unauthorized file system access through a path traversal issue. The vulnerability may lead to remote code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57789",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-257"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_4.html",
          "name" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_4.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Commvault before 11.36.60. During the brief window between installation and the first administrator login, remote attackers may exploit the default credential to gain admin control. This is limited to the setup phase, before any jobs have been configured."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57788",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-259"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_3.html",
          "name" : "https://documentation.commvault.com/securityadvisories/CV_2025_08_3.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Commvault before 11.36.60. A vulnerability in a known login mechanism allows unauthenticated attackers to execute API calls without requiring user credentials. RBAC helps limit the exposure but does not eliminate risk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57748",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57747",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57746",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57745",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57744",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57743",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57742",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T04:16Z",
    "lastModifiedDate" : "2025-08-20T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8289",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.4/classes/class-wpcf7r-save-files.php#L80",
          "name" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.4/classes/class-wpcf7r-save-files.php#L80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7909b75-8087-4d38-8325-c619bf84d997?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7909b75-8087-4d38-8325-c619bf84d997?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the delete_associated_files function. This makes it possible for unauthenticated attackers to inject a PHP Object. This vulnerability may be exploited by unauthenticated attackers when a form is present on the site with a file upload action, and doesn't affect sites with PHP version > 8. This vulnerability also requires the 'Redirection For Contact Form 7 Extension - Create Post' extension to be installed and activated in order to be exploited. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. We confirmed there is a usable gadget in Contact Form 7 plugin that makes arbitrary file deletion possible when installed with this plugin. Given Contact Form 7 is a requirement of this plugin, it is likely that any site with this plugin and the 'Redirection For Contact Form 7 Extension - Create Post' extension enabled is vulnerable to arbitrary file deletion."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-20T03:15Z",
    "lastModifiedDate" : "2025-08-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8145",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.3/classes/class-wpcf7r-lead.php#L144",
          "name" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.3/classes/class-wpcf7r-lead.php#L144",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cb275d5-ec4b-419f-84e1-84172d381411?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2cb275d5-ec4b-419f-84e1-84172d381411?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Redirection for Contact Form 7 plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.2.4 via deserialization of untrusted input in the get_lead_fields function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in a Contact Form 7 plugin allows attackers to delete arbitrary files. Additionally, in certain server configurations, Remote Code Execution is possible"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-20T03:15Z",
    "lastModifiedDate" : "2025-08-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8141",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.3/classes/class-wpcf7r-save-files.php#L80",
          "name" : "https://plugins.trac.wordpress.org/browser/wpcf7-redirect/tags/3.2.3/classes/class-wpcf7r-save-files.php#L80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fafd0159-25ab-430d-88ef-c4d09d23baa7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fafd0159-25ab-430d-88ef-c4d09d23baa7?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Redirection for Contact Form 7 plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_associated_files function in all versions up to, and including, 3.2.4. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-20T03:15Z",
    "lastModifiedDate" : "2025-08-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54364",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1333"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/microsoft/knack",
          "name" : "https://github.com/microsoft/knack",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/microsoft-knack-python-package-regular-expression-dos",
          "name" : "https://www.vulncheck.com/advisories/microsoft-knack-python-package-regular-expression-dos",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module (issue 2 of 2)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T03:15Z",
    "lastModifiedDate" : "2025-08-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54363",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1333"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/microsoft/knack",
          "name" : "https://github.com/microsoft/knack",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/microsoft-knack-python-package-regular-expression-dos",
          "name" : "https://www.vulncheck.com/advisories/microsoft-knack-python-package-regular-expression-dos",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Microsoft Knack 0.12.0 allows Regular expression Denial of Service (ReDoS) in the knack.introspection module (issue 1 of 2)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T03:15Z",
    "lastModifiedDate" : "2025-08-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9132",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_19.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_19.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://issues.chromium.org/issues/436181695",
          "name" : "https://issues.chromium.org/issues/436181695",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds write in V8 in Google Chrome prior to 139.0.7258.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T01:15Z",
    "lastModifiedDate" : "2025-08-20T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-12223",
        "ASSIGNER" : "vdp@themissinglink.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.themissinglink.com.au/security-advisories/cve-2024-12223",
          "name" : "https://www.themissinglink.com.au/security-advisories/cve-2024-12223",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Prism Central versions prior to 2024.3.1 are vulnerable to a stored cross-site scripting attack via the Events component, allowing an attacker to hijack a victim user’s session and perform actions in their security context."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-20T01:15Z",
    "lastModifiedDate" : "2025-08-20T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9193",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1iorjSJ8gh3hTDZUy1fHyV-TJXFP43yIo/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1iorjSJ8gh3hTDZUy1fHyV-TJXFP43yIo/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320579",
          "name" : "VDB-320579 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320579",
          "name" : "VDB-320579 | TOTVS Portal Meu RH Password Reset redirect",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.636360",
          "name" : "Submit #636360 | TOTVS Portal Meu RH 12.1.17 Open Redirect combined with phishing in password reset",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in TOTVS Portal Meu RH up to 12.1.17. Impacted is an unknown function of the component Password Reset Handler. Executing manipulation of the argument redirectUrl can lead to open redirect. The attack may be performed from a remote location. The exploit has been published and may be used. Upgrading to version 12.1.2410.274, 12.1.2502.178 and 12.1.2506.121 is recommended to address this issue. It is recommended to upgrade the affected component. The vendor explains, that \"[o]ur internal validation (...) confirms that the reported behavior does not exist in currently supported releases. In these tests, the redirectUrl parameter is ignored, and no malicious redirection occurs.\" This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-20T00:15Z",
    "lastModifiedDate" : "2025-08-20T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9176",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01",
          "name" : "https://magnificent-dill-351.notion.site/Command-Execution-of-env-in-shc-4-0-3-249c693918ed80c997f4e9420f945d01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320557",
          "name" : "VDB-320557 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320557",
          "name" : "VDB-320557 | neurobin shc Environment Variable shc.c make os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630744",
          "name" : "Submit #630744 | shc <=4.0.3 Command Execution",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in neurobin shc up to 4.0.3. Impacted is the function make of the file src/shc.c of the component Environment Variable Handler. The manipulation results in os command injection. The attack is only possible with local access. The exploit has been released to the public and may be exploited."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-20T00:15Z",
    "lastModifiedDate" : "2025-08-20T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9175",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087",
          "name" : "https://magnificent-dill-351.notion.site/Stack-Overflow-in-shc-4-0-3-249c693918ed804b8c44ee11eb0af087",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320556",
          "name" : "VDB-320556 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320556",
          "name" : "VDB-320556 | neurobin shc shc.c make stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630743",
          "name" : "Submit #630743 | shc <=4.0.3 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in neurobin shc up to 4.0.3. This issue affects the function make of the file src/shc.c. The manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit is publicly available and might be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T23:15Z",
    "lastModifiedDate" : "2025-08-19T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9174",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96",
          "name" : "https://magnificent-dill-351.notion.site/Command-Execution-in-shc-4-0-3-249c693918ed8040abe3e636c7f18c96",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320555",
          "name" : "VDB-320555 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320555",
          "name" : "VDB-320555 | neurobin shc Filename shc.c make os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630742",
          "name" : "Submit #630742 | shc <=4.0.3 Command Execution",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in neurobin shc up to 4.0.3. This vulnerability affects the function make of the file src/shc.c of the component Filename Handler. Executing manipulation can lead to os command injection. The attack can only be executed locally. The exploit has been publicly disclosed and may be utilized."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T23:15Z",
    "lastModifiedDate" : "2025-08-19T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9171",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md#-exploitation-steps",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20%E2%80%93%20Stored%20XSS%205.md#-exploitation-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320548",
          "name" : "VDB-320548 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320548",
          "name" : "VDB-320548 | SolidInvoice Clients clients cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630639",
          "name" : "Submit #630639 | Open-Source SolidInvoice 2.4.0 PoC – Stored XSS via Client Name Field in SolidInvoice 2.4.0",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in SolidInvoice up to 2.4.0. The impacted element is an unknown function of the file /clients of the component Clients Module. Performing manipulation of the argument Name results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T23:15Z",
    "lastModifiedDate" : "2025-08-19T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9170",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md#-exploitation-steps",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-Stored%20XSS%204.md#-exploitation-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320547",
          "name" : "VDB-320547 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320547",
          "name" : "VDB-320547 | SolidInvoice Tax Rates rates cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630627",
          "name" : "Submit #630627 | Open-Source SolidInvoice  2.4.0 Stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in SolidInvoice up to 2.4.0. The affected element is an unknown function of the file /tax/rates of the component Tax Rates Module. Such manipulation of the argument Name leads to cross site scripting. The attack can be executed remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T22:15Z",
    "lastModifiedDate" : "2025-08-19T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9169",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md#-exploitation-steps",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84PoC%20-%20Stored%20XSS%203.md#-exploitation-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320546",
          "name" : "VDB-320546 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320546",
          "name" : "VDB-320546 | SolidInvoice Quote quotes cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630626",
          "name" : "Submit #630626 | Open-Source SolidInvoic 2.4.0 stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in SolidInvoice up to 2.4.0. Impacted is an unknown function of the file /quotes of the component Quote Module. This manipulation of the argument Name causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T22:15Z",
    "lastModifiedDate" : "2025-08-19T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9187",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1825621%2C1970079%2C1976736%2C1979072",
          "name" : "Memory safety bugs fixed in Firefox 142 and Thunderbird 142",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142 and Thunderbird < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9186",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1445758",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1445758",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Spoofing issue in the Address Bar component of Firefox Focus for Android. This vulnerability affects Firefox < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9185",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1970154%2C1976782%2C1977166",
          "name" : "Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9184",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1929482%2C1976376%2C1979163%2C1979955",
          "name" : "Memory safety bugs fixed in Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 140.2, Thunderbird < 142, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9183",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976102",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976102",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Spoofing issue in the Address Bar component. This vulnerability affects Firefox < 142 and Firefox ESR < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9182",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1975837",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1975837",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "'Denial-of-service due to out-of-memory in the Graphics: WebRender component.' This vulnerability affects Firefox < 142, Firefox ESR < 140.2, Thunderbird < 142, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9181",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1977130",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1977130",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 142, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9180",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979782",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979782",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "'Same-origin policy bypass in the Graphics: Canvas2D component.' This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9179",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979527",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979527",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-64/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-65/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-66/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-67/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-70/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-71/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-72/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9168",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md#-exploitation-steps",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%93%84POC%20Stored%20XSS%202.md#-exploitation-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320545",
          "name" : "VDB-320545 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320545",
          "name" : "VDB-320545 | SolidInvoice Invoice Creation invoice cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630625",
          "name" : "Submit #630625 | Open-Source SolidInvoice 2.4.0 Stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SolidInvoice up to 2.4.0. This issue affects some unknown processing of the file /invoice of the component Invoice Creation Module. The manipulation of the argument Client Name results in cross site scripting. The attack may be launched remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9167",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md#-exploitation-steps",
          "name" : "https://github.com/Gabrielmouraofc/PoC_Vuldb/blob/main/%F0%9F%95%B5%EF%B8%8F%E2%80%8D%E2%99%82%EF%B8%8F%20PoC%20-%20Stored%20XSS%201.md#-exploitation-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320544",
          "name" : "VDB-320544 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320544",
          "name" : "VDB-320544 | SolidInvoice Recurring Invoice recurring cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630624",
          "name" : "Submit #630624 | Open-Source SolidInvoice 2.4.0 Stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SolidInvoice up to 2.4.0. This vulnerability affects unknown code of the file /invoice/recurring of the component Recurring Invoice Module. The manipulation of the argument client name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8364",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1909609",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1909609",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1969937",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1969937",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A crafted URL using a blob: URI could have hidden the true origin of the page, resulting in a potential spoofing attack.\n*Note: This issue only affected Android operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8042",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1791322",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1791322",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Firefox for Android allowed a sandboxed iframe without the `allow-downloads` attribute to start downloads. This vulnerability affects Firefox < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8041",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1670725",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1670725",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the address bar, Firefox for Android truncated the display of URLs from the end instead of prioritizing the origin. This vulnerability affects Firefox < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55033",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1913825",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1913825",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dragging JavaScript links to the URL bar in Focus for iOS could be utilized to run malicious scripts, potentially resulting in XSS attacks This vulnerability affects Focus for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55032",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976296",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976296",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Focus for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline, potentially allowing for XSS attacks This vulnerability affects Focus for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55031",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979499",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979499",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979804",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1979804",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-69/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Malicious pages could use Firefox for iOS to pass FIDO: links to the OS and trigger the hybrid passkey transport. An attacker within Bluetooth range could have used this to trick the user into using their passkey to log the attacker's computer into the target account. This vulnerability affects Firefox for iOS < 142 and Focus for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55030",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976304",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1976304",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Firefox for iOS would not respect a Content-Disposition header of type Attachment and would incorrectly display the content inline rather than downloading, potentially allowing for XSS attacks This vulnerability affects Firefox for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55029",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1973577",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1973577",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Malicious scripts could bypass the popup blocker to spam new tabs, potentially resulting in denial of service attacks This vulnerability affects Firefox for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55028",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1850240",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1850240",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-68/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Malicious scripts utilizing repetitive JavaScript alerts could prevent client user interaction in some scenarios and allow for denial of service attacks This vulnerability affects Firefox for iOS < 142."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54145",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946122",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946122",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The QR scanner could allow arbitrary websites to be opened if a user was tricked into scanning a malicious link that leveraged Firefox's open-text URL scheme This vulnerability affects Firefox for iOS < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54144",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946062",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946062",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The URL scheme used by Firefox to facilitate searching of text queries could incorrectly allow attackers to open arbitrary website URLs or internal pages if a user was tricked into clicking a link This vulnerability affects Firefox for iOS < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54143",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1912671",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1912671",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-60/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sandboxed iframes on webpages could potentially allow downloads to the device, bypassing the expected sandbox restrictions declared on the parent page This vulnerability affects Firefox for iOS < 141."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T21:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9165",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.libtiff.org/",
          "name" : "http://www.libtiff.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1FWhmkzksH8-qU0ZM6seBzGNB3aPnX3G8/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0",
          "name" : "https://gitlab.com/libtiff/libtiff/-/commit/ed141286a37f6e5ddafb5069347ff5d587e7a4e0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/issues/728",
          "name" : "https://gitlab.com/libtiff/libtiff/-/issues/728",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/merge_requests/747",
          "name" : "https://gitlab.com/libtiff/libtiff/-/merge_requests/747",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320543",
          "name" : "VDB-320543 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320543",
          "name" : "VDB-320543 | LibTIFF tiffcmp tiffcmp.c InitCCITTFax3 memory leak",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630506",
          "name" : "Submit #630506 | libtiff tiffcmp  4.7.0+ (latest master branch) Memory Leak",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630507",
          "name" : "Submit #630507 | libtiff tiffcmp  4.7.0+ (latest master branch) Memory Leak (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in LibTIFF 4.7.0. This affects the function _TIFFmallocExt/_TIFFCheckRealloc/TIFFHashSetNew/InitCCITTFax3 of the file tools/tiffcmp.c of the component tiffcmp. Executing manipulation can lead to memory leak. The attack is restricted to local execution. The exploit has been published and may be used. This patch is called ed141286a37f6e5ddafb5069347ff5d587e7a4e0. It is best practice to apply a patch to resolve this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9157",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1_aONM_TOF96JbnYviPyZhVk-7HObtX8H/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1_aONM_TOF96JbnYviPyZhVk-7HObtX8H/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/commit/73008f261f1cdf7a1087dc8759115242696d35da",
          "name" : "https://github.com/appneta/tcpreplay/commit/73008f261f1cdf7a1087dc8759115242696d35da",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/970",
          "name" : "https://github.com/appneta/tcpreplay/issues/970",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/970#issuecomment-3198966053",
          "name" : "https://github.com/appneta/tcpreplay/issues/970#issuecomment-3198966053",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320537",
          "name" : "VDB-320537 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320537",
          "name" : "VDB-320537 | appneta tcpreplay tcprewrite edit_packet.c untrunc_packet use after free",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630495",
          "name" : "Submit #630495 | tcpreplay tcprewrite  tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Use-After-Free",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in appneta tcpreplay up to 4.5.2-beta2. The impacted element is the function untrunc_packet of the file src/tcpedit/edit_packet.c of the component tcprewrite. Executing manipulation can lead to use after free. It is possible to launch the attack on the local host. The exploit has been publicly disclosed and may be utilized. This patch is called 73008f261f1cdf7a1087dc8759115242696d35da. Applying a patch is advised to resolve this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9156",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kangsf1989/2025/issues/1",
          "name" : "https://github.com/kangsf1989/2025/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320536",
          "name" : "VDB-320536 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320536",
          "name" : "VDB-320536 | itsourcecode Sports Management System sports.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630274",
          "name" : "Submit #630274 | itsourcecode Sports Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Sports Management System 1.0. The affected element is an unknown function of the file /Admin/sports.php. Performing manipulation of the argument code results in sql injection. Remote exploitation of the attack is possible. The exploit has been made public and could be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9155",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/HjsCS/CVE/issues/2",
          "name" : "https://github.com/HjsCS/CVE/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320535",
          "name" : "VDB-320535 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320535",
          "name" : "VDB-320535 | itsourcecode Online Tour and Travel Management System forget_password.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630202",
          "name" : "Submit #630202 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Impacted is an unknown function of the file /user/forget_password.php. Such manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55740",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1392"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Anipaleja/nginx-defender/security/advisories/GHSA-pr72-8fxw-xx22",
          "name" : "https://github.com/Anipaleja/nginx-defender/security/advisories/GHSA-pr72-8fxw-xx22",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "nginx-defender is a high-performance, enterprise-grade Web Application Firewall (WAF) and threat detection system engineered for modern web infrastructure. This is a configuration vulnerability affecting nginx-defender deployments. Example configuration files\nconfig.yaml and docker-compose.yml contain default credentials (default_password: \"change_me_please\", GF_SECURITY_ADMIN_PASSWORD=admin123). If users deploy nginx-defender without changing these defaults, attackers with network access could gain administrative control, bypassing security protections. The issue is addressed in v1.5.0 and later."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55737",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6hp9-jv2f-88wr",
          "name" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6hp9-jv2f-88wr",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, when deleting a comment, there's no validation of the ownership of the comment. Every user can delete an arbitrary comment of another user on every post, by simply intercepting the delete request and changing the commentID. The code that causes the problem is in routes/post.py."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52337",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cwe.mitre.org/data/definitions/434.html",
          "name" : "https://cwe.mitre.org/data/definitions/434.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/TrustStackSecurity/Advisories/blob/main/CVE-2025-52337/README.md",
          "name" : "https://github.com/TrustStackSecurity/Advisories/blob/main/CVE-2025-52337/README.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2022-22947",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2022-22947",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated arbitrary file upload vulnerability in the Content Explorer feature of LogicData eCommerce Framework v5.0.9.7000 allows attackers to execute arbitrary code via uploading a crafted file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51543",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://cicool.com",
          "name" : "http://cicool.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JustDinooo/CVEs/blob/main/CVE-2025-51543/poc.md",
          "name" : "https://github.com/JustDinooo/CVEs/blob/main/CVE-2025-51543/poc.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Cicool builder 3.4.4 allowing attackers to reset the administrator's password via the /administrator/auth/reset_password endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50926",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://packetstorm.news/files/id/207907",
          "name" : "https://packetstorm.news/files/id/207907",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.ehcp.net/?p=402",
          "name" : "https://www.ehcp.net/?p=402",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Easy Hosting Control Panel EHCP v20.04.1.b was discovered to contain a SQL injection vulnerability via the id parameter in the List All Email Addresses function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43744",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43744",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43744",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored DOM-based Cross-Site Scripting (XSS) vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.5, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 exists in the Asset Publisher configuration UI within the Source.js module. This vulnerability allows attackers to inject arbitrary JavaScript via DDM structure field labels which are then inserted into the DOM using innerHTML without proper encoding."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43743",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-203"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43743",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43743",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.5, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15 and 7.4 GA through update 92 allows any authenticated remote user to view other calendars by allowing them to enumerate the names of other users, given an attacker the possibility to send phishing to these users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2988",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242391",
          "name" : "https://www.ibm.com/support/pages/node/7242391",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.7, 6.2.0.0 through 6.2.0.4, and 6.2.1.0 could disclose sensitive server information to an unauthorized user that could aid in further attacks against the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T20:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9154",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/HjsCS/CVE/issues/3",
          "name" : "https://github.com/HjsCS/CVE/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/HjsCS/CVE/issues/3",
          "name" : "https://github.com/HjsCS/CVE/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320534",
          "name" : "VDB-320534 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320534",
          "name" : "VDB-320534 | itsourcecode Online Tour and Travel Management System page-login.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630201",
          "name" : "Submit #630201 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /user/page-login.php. This manipulation of the argument email causes sql injection. The attack may be initiated remotely. The exploit has been published and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9153",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/HjsCS/CVE/issues/4",
          "name" : "https://github.com/HjsCS/CVE/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/HjsCS/CVE/issues/4",
          "name" : "https://github.com/HjsCS/CVE/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320533",
          "name" : "VDB-320533 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320533",
          "name" : "VDB-320533 | itsourcecode Online Tour and Travel Management System travellers.php unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630200",
          "name" : "Submit #630200 | itsourcecode Online Tour and Travel Management System V1.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument photo results in unrestricted upload. The attack can be launched remotely. The exploit is now public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55736",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-425"
          }, {
            "lang" : "en",
            "value" : "CWE-807"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-wf72",
          "name" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-6q83-vfmq-wf72",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, an arbitrary user can change his role to \"admin\", giving its relative privileges (e.g. delete users, posts, comments etc.). The problem is in the routes/adminPanelUsers file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55735",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-807"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-gj9v-qhc3-gcfx",
          "name" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-gj9v-qhc3-gcfx",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, when creating a post, there's no validation of the content of the post stored in the variable \"postContent\". The vulnerability arises when displaying the content of the post using the | safe filter, that tells the engine to not escape the rendered content. This can lead to a stored XSS inside the content of the post. The code that causes the problem is in template/routes.html."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55734",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx",
          "name" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-h239-vv39-v3vx",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8",
          "name" : "https://github.com/DogukanUrker/FlaskBlog/security/advisories/GHSA-jw79-2xvp-76p8",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "flaskBlog is a blog app built with Flask. In 2.8.0 and earlier, the code checks if the userRole is \"admin\" only when visiting the /admin page, but not when visiting its subroutes. Specifically, only the file routes/adminPanel.py checks the user role when a user is trying to access the admin page, but that control is not done for the pages routes/adminPanelComments.py and routes/adminPanelPosts.py. Thus, an unauthorized user can bypass the intended restrictions, leaking sensitive data and accessing the following pages: /admin/posts, /adminpanel/posts, /admin/comments, and /adminpanel/comments."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55733",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2",
          "name" : "https://github.com/ThinkInAIXYZ/deepchat/commit/a0ff6f362e01ddceb7fd42d0af0b28b6184fb4d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j",
          "name" : "https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j",
          "name" : "https://github.com/ThinkInAIXYZ/deepchat/security/advisories/GHSA-hqr4-4gfc-5p2j",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DeepChat is a smart assistant that connects powerful AI to your personal world.  DeepChat before 0.3.1 has a one-click remote code execution vulnerability. An attacker can exploit this vulnerability by embedding a specially crafted deepchat: URL on any website, including a malicious one they control. When a victim visits such a site or clicks on the link, the browser triggers the app’s custom URL handler (deepchat:), causing the DeepChat application to launch and process the URL, leading to remote code execution on the victim’s machine. This vulnerability is fixed in 0.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55306",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Mouy-leng/GenX_FX/security/advisories/GHSA-2xjq-pvwj-mvm6",
          "name" : "https://github.com/Mouy-leng/GenX_FX/security/advisories/GHSA-2xjq-pvwj-mvm6",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GenX_FX is an advance IA trading platform that will focus on forex trading. A vulnerability was identified in the GenX FX backend where API keys and authentication tokens may be exposed if environment variables are misconfigured. Unauthorized users could gain access to cloud resources (Google Cloud, Firebase, GitHub, etc.)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55303",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/withastro/astro/commit/4d16de7f95db5d1ec1ce88610d2a95e606e83820",
          "name" : "https://github.com/withastro/astro/commit/4d16de7f95db5d1ec1ce88610d2a95e606e83820",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749",
          "name" : "https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749",
          "name" : "https://github.com/withastro/astro/security/advisories/GHSA-xf8x-j4p2-f749",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Astro is a web framework for content-driven websites. In versions of astro before 5.13.2 and 4.16.18, the image optimization endpoint in projects deployed with on-demand rendering allows images from unauthorized third-party domains to be served. On-demand rendered sites built with Astro include an /_image endpoint which returns optimized versions of images. A bug in impacted versions of astro allows an attacker to bypass the third-party domain restrictions by using a protocol-relative URL as the image source, e.g. /_image?href=//example.com/image.png. This vulnerability is fixed in 5.13.2 and 4.16.18."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52338",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cwe.mitre.org/data/definitions/521.html",
          "name" : "https://cwe.mitre.org/data/definitions/521.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cwe.mitre.org/data/definitions/522.html",
          "name" : "https://cwe.mitre.org/data/definitions/522.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/TrustStackSecurity/Advisories/tree/main/CVE-2025-52338",
          "name" : "https://github.com/TrustStackSecurity/Advisories/tree/main/CVE-2025-52338",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.logicdata.com/products/webstore-for-erp-ecommerce-integration/",
          "name" : "https://www.logicdata.com/products/webstore-for-erp-ecommerce-integration/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in the default configuration of the password reset function in LogicData eCommerce Framework v5.0.9.7000 allows attackers to bypass authentication and compromise user accounts via a bruteforce attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50891",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nikolas-ch/CVEs/blob/main/AdformTracking_ReflectedXSS/AdformTracking_ReflectedXSS.txt",
          "name" : "https://github.com/nikolas-ch/CVEs/blob/main/AdformTracking_ReflectedXSS/AdformTracking_ReflectedXSS.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/nikolas-ch/CVEs/tree/main/AdformTracking_ReflectedXSS",
          "name" : "https://github.com/nikolas-ch/CVEs/tree/main/AdformTracking_ReflectedXSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adform Site Tracking 1.1 allows attackers to inject HTML or execute arbitrary code via cookie hijacking."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43745",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43745",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43745",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A CSRF vulnerability in Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.7, 2025.Q1.0 through 2025.Q1.14, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.19 and 7.4 GA through update 92 allows remote attackers to performs cross-origin request on behalf of the authenticated user via the endpoint parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43737",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43737",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43737",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8 and 2025.Q1.0 through 2025.Q1.15 allows a remote authenticated user to inject JavaScript code via _com_liferay_journal_web_portlet_JournalPortlet_backURL parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33008",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242392",
          "name" : "https://www.ibm.com/support/pages/node/7242392",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Sterling B2B Integrator 6.2.1.0 and IBM Sterling File Gateway 6.2.1.0 is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31988",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123435",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123435",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Digital Experience is susceptible to cross site scripting (XSS) in an administrative UI with restricted access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-44373",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AllskyTeam/allsky",
          "name" : "https://github.com/AllskyTeam/allsky",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/AllskyTeam/allsky/blob/master/html/includes/save_file.php",
          "name" : "https://github.com/AllskyTeam/allsky/blob/master/html/includes/save_file.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lean-strand-cb6.notion.site/CVE-2024-44373-21efbd400a6c80f4a5abf5d5eb9b068c",
          "name" : "https://lean-strand-cb6.notion.site/CVE-2024-44373-21efbd400a6c80f4a5abf5d5eb9b068c",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Path Traversal vulnerability in AllSky v2023.05.01_04 allows an unauthenticated attacker to create a webshell and remote code execution via the path, content parameter to /includes/save_file.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T19:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9151",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/echo0d/vulnerability/blob/main/LiuYuYang01_ThriveX-Blog/IncorrectAuthorization.md",
          "name" : "https://github.com/echo0d/vulnerability/blob/main/LiuYuYang01_ThriveX-Blog/IncorrectAuthorization.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/echo0d/vulnerability/blob/main/LiuYuYang01_ThriveX-Blog/IncorrectAuthorization.md#poc",
          "name" : "https://github.com/echo0d/vulnerability/blob/main/LiuYuYang01_ThriveX-Blog/IncorrectAuthorization.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320530",
          "name" : "VDB-320530 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320530",
          "name" : "VDB-320530 | LiuYuYang01 ThriveX-Blog web updateJsonValueByName improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629873",
          "name" : "Submit #629873 | LiuYuYang01 https://github.com/LiuYuYang01/ThriveX-Blog <=3.1.7 Incorrect Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in LiuYuYang01 ThriveX-Blog up to 3.1.7. Affected by this vulnerability is the function updateJsonValueByName of the file /web_config/json/name/web. Performing manipulation results in improper authorization. It is possible to initiate the attack remotely. The exploit has been released to the public and may be exploited. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9150",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xinzfy/cve/issues/1",
          "name" : "https://github.com/xinzfy/cve/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320529",
          "name" : "VDB-320529 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320529",
          "name" : "VDB-320529 | Surbowl dormitory-management-php violation_add.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629618",
          "name" : "Submit #629618 | github.com dormitory-management-php V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Surbowl dormitory-management-php up to 9f1d9d1f528cabffc66fda3652c56ff327fda317. Affected is an unknown function of the file /admin/violation_add.php?id=2. Such manipulation of the argument ID leads to sql injection. The attack may be performed from a remote location. The exploit is publicly available and might be used. This product utilizes a rolling release system for continuous delivery, and as such, version information for affected or updated releases is not disclosed. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9149",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Wavlink/Wavlink.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320528",
          "name" : "VDB-320528 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320528",
          "name" : "VDB-320528 | Wavlink WL-NU516U1 wireless.cgi sub_4032E4 command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629181",
          "name" : "Submit #629181 | Wavlink WL-NU516U1-A M16U1_V240425 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Wavlink WL-NU516U1 M16U1_V240425. This impacts the function sub_4032E4 of the file /cgi-bin/wireless.cgi. This manipulation of the argument Guest_ssid causes command injection. The attack is possible to be carried out remotely. The exploit has been publicly disclosed and may be utilized."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8450",
        "ASSIGNER" : "security.reports@fortra.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cve.org/cverecord?id=CVE-2025-8450",
          "name" : "https://www.cve.org/cverecord?id=CVE-2025-8450",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Access Control issue in the Workflow component of Fortra's FileCatalyst allows unauthenticated users to upload arbitrary files via the order forms page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55295",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StuffAnThings/qbit_manage/releases/tag/v4.5.4",
          "name" : "https://github.com/StuffAnThings/qbit_manage/releases/tag/v4.5.4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/StuffAnThings/qbit_manage/security/advisories/GHSA-vh56-26wq-vvfv",
          "name" : "https://github.com/StuffAnThings/qbit_manage/security/advisories/GHSA-vh56-26wq-vvfv",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "qBit Manage is a tool that helps manage tedious tasks in qBittorrent and automate them. A path traversal vulnerability exists in qbit_manage's web API that allows authenticated users to read arbitrary files from the server filesystem through the restore_config_from_backup endpoint. The vulnerability allows attackers to bypass directory restrictions and read arbitrary files from the server filesystem by manipulating the backup_id parameter with path traversal sequences (e.g., ../). This vulnerability is fixed in 4.5.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55294",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/bencevans/screenshot-desktop/commit/59c87b0c175eec76090e6ccde313f4fc5d569b78",
          "name" : "https://github.com/bencevans/screenshot-desktop/commit/59c87b0c175eec76090e6ccde313f4fc5d569b78",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/bencevans/screenshot-desktop/security/advisories/GHSA-gjx4-2c7g-fm94",
          "name" : "https://github.com/bencevans/screenshot-desktop/security/advisories/GHSA-gjx4-2c7g-fm94",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "screenshot-desktop allows capturing a screenshot of your local machine. This vulnerability is a command injection issue. When user-controlled input is passed into the format option of the screenshot function, it is interpolated into a shell command without sanitization. This results in arbitrary command execution with the privileges of the calling process. This vulnerability is fixed in 1.15.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55153",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE is a duplicate of another CVE."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T18:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9148",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hip-motorcycle-97a.notion.site/Chat2DB-H2-JDBC-Connection-Remote-Code-Execution-2465f5e4caac80999d51dc98e8fc935f",
          "name" : "https://hip-motorcycle-97a.notion.site/Chat2DB-H2-JDBC-Connection-Remote-Code-Execution-2465f5e4caac80999d51dc98e8fc935f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320527",
          "name" : "VDB-320527 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320527",
          "name" : "VDB-320527 | CodePhiliaX Chat2DB JDBC Connection DataSourceController.java sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628912",
          "name" : "Submit #628912 | CodePhiliaX Chat2DB 0.3.7 JDBC Connection Remote Code Execution",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in CodePhiliaX Chat2DB up to 0.3.7. This affects an unknown function of the file ai/chat2db/server/web/api/controller/data/source/DataSourceController.java of the component JDBC Connection Handler. The manipulation results in sql injection. The attack can be executed remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9147",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320526",
          "name" : "VDB-320526 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320526",
          "name" : "VDB-320526 | jasonclark getsemantic index.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628786",
          "name" : "https://vuldb.com/?submit.628786",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628786",
          "name" : "Submit #628786 | jasonclark getsemantic Master xss",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in jasonclark getsemantic up to 040c96eb8cf9947488bd01b8de99b607b0519f7d. The impacted element is an unknown function of the file /index.php. The manipulation of the argument view leads to cross site scripting. Remote exploitation of the attack is possible. The exploit has been disclosed to the public and may be used. This product follows a rolling release approach for continuous delivery, so version details for affected or updated releases are not provided. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54881",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mermaid-js/mermaid/commit/5c69e5fdb004a6d0a2abe97e23d26e223a059832",
          "name" : "https://github.com/mermaid-js/mermaid/commit/5c69e5fdb004a6d0a2abe97e23d26e223a059832",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mermaid-js/mermaid/commit/685516a85ec1df64cefd4fd15f26533be87d458e",
          "name" : "https://github.com/mermaid-js/mermaid/commit/685516a85ec1df64cefd4fd15f26533be87d458e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-7rqq-prvp-x9jh",
          "name" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-7rqq-prvp-x9jh",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. In the default configuration of mermaid 10.9.0-rc.1 to 11.9.0, user supplied input for sequence diagram labels is passed to innerHTML during calculation of element size, causing XSS."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54880",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mermaid-js/mermaid/commit/2aa83302795183ea5c65caec3da1edd6cb4791fc",
          "name" : "https://github.com/mermaid-js/mermaid/commit/2aa83302795183ea5c65caec3da1edd6cb4791fc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mermaid-js/mermaid/commit/734bde38777c9190a5a72e96421c83424442d4e4",
          "name" : "https://github.com/mermaid-js/mermaid/commit/734bde38777c9190a5a72e96421c83424442d4e4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw",
          "name" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw",
          "name" : "https://github.com/mermaid-js/mermaid/security/advisories/GHSA-8gwm-58g9-j8pw",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mermaid is a JavaScript based diagramming and charting tool that uses Markdown-inspired text definitions and a renderer to create and modify complex diagrams. In the default configuration of mermaid 11.9.0 and earlier, user supplied input for architecture diagram icons is passed to the d3 html() method, creating a sink for cross site scripting. This vulnerability is fixed in 11.10.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54411",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/discourse/discourse/commit/a3374d2850f07444d113216e1d539ee21650dbff",
          "name" : "https://github.com/discourse/discourse/commit/a3374d2850f07444d113216e1d539ee21650dbff",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/discourse/discourse/security/advisories/GHSA-5mm6-j5vq-6884",
          "name" : "https://github.com/discourse/discourse/security/advisories/GHSA-5mm6-j5vq-6884",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Discourse is an open-source discussion platform. Welcome banner user name string for logged in users can be vulnerable to XSS attacks, which affect the user themselves or an admin impersonating them. Admins can temporarily alter the welcome_banner.header.logged_in_members site text to remove the preferred_display_name placeholder, or not impersonate\nany users for the time being. This vulnerability is fixed in 3.5.0.beta8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52478",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/n8n-io/n8n/commit/7940384a85041a1890b1203d69c092c887312500",
          "name" : "https://github.com/n8n-io/n8n/commit/7940384a85041a1890b1203d69c092c887312500",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/n8n-io/n8n/pull/16329",
          "name" : "https://github.com/n8n-io/n8n/pull/16329",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/n8n-io/n8n/security/advisories/GHSA-hfmv-hhh3-43f2",
          "name" : "https://github.com/n8n-io/n8n/security/advisories/GHSA-hfmv-hhh3-43f2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "n8n is a workflow automation platform. From 1.77.0 to before 1.98.2, a stored Cross-Site Scripting (XSS) vulnerability was identified in n8n, specifically in the Form Trigger node's HTML form element. An authenticated attacker can inject malicious HTML via an <iframe> with a srcdoc payload that includes arbitrary JavaScript execution. The attacker can also inject malicious Javascript by using <video> coupled <source> using an onerror event. While using iframe or a combination of video and source tag, this vulnerability allows for Account Takeover (ATO) by exfiltrating n8n-browserId and session cookies from authenticated users who visit a maliciously crafted form. Using these tokens and cookies, an attacker can impersonate the victim and change account details such as email addresses, enabling full control over the account—especially if 2FA is not enabled. Users should upgrade to version >= 1.98.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51506",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2025-51506",
          "name" : "https://github.com/MVRC-ITSEC/CVEs/blob/main/CVE-2025-51506",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://hrforecast.com/",
          "name" : "https://hrforecast.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://hrforecast.com/smartlibrary-job-architecture/",
          "name" : "https://hrforecast.com/smartlibrary-job-architecture/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the smartLibrary component of the HRForecast Suite 0.4.3, a SQL injection vulnerability was discovered in the valueKey parameter. This flaw enables any authenticated user to execute arbitrary SQL queries, via crafted payloads to valueKey to the api/smartlibrary/v2/en/dictionaries/options/lookup endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38615",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/358d4f821c03add421a4c49290538a705852ccf1",
          "name" : "https://git.kernel.org/stable/c/358d4f821c03add421a4c49290538a705852ccf1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3ed2cc6a6e93fbeb8c0cafce1e7fb1f64a331dcc",
          "name" : "https://git.kernel.org/stable/c/3ed2cc6a6e93fbeb8c0cafce1e7fb1f64a331dcc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a285395020780adac1ffbc844069c3d700bf007a",
          "name" : "https://git.kernel.org/stable/c/a285395020780adac1ffbc844069c3d700bf007a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b35a50d639ca5259466ef5fea85529bb4fb17d5b",
          "name" : "https://git.kernel.org/stable/c/b35a50d639ca5259466ef5fea85529bb4fb17d5b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d99208b91933fd2a58ed9ed321af07dacd06ddc3",
          "name" : "https://git.kernel.org/stable/c/d99208b91933fd2a58ed9ed321af07dacd06ddc3",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nfs/ntfs3: cancle set bad inode after removing name fails\n\nThe reproducer uses a file0 on a ntfs3 file system with a corrupted i_link.\nWhen renaming, the file0's inode is marked as a bad inode because the file\nname cannot be deleted.\n\nThe underlying bug is that make_bad_inode() is called on a live inode.\nIn some cases it's \"icache lookup finds a normal inode, d_splice_alias()\nis called to attach it to dentry, while another thread decides to call\nmake_bad_inode() on it - that would evict it from icache, but we'd already\nfound it there earlier\".\nIn some it's outright \"we have an inode attached to dentry - that's how we\ngot it in the first place; let's call make_bad_inode() on it just for shits\nand giggles\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38614",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3542c90797bc3ab83ebab54b737d751cf3682036",
          "name" : "https://git.kernel.org/stable/c/3542c90797bc3ab83ebab54b737d751cf3682036",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f2e467a48287c868818085aa35389a224d226732",
          "name" : "https://git.kernel.org/stable/c/f2e467a48287c868818085aa35389a224d226732",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\neventpoll: Fix semi-unbounded recursion\n\nEnsure that epoll instances can never form a graph deeper than\nEP_MAX_NESTS+1 links.\n\nCurrently, ep_loop_check_proc() ensures that the graph is loop-free and\ndoes some recursion depth checks, but those recursion depth checks don't\nlimit the depth of the resulting tree for two reasons:\n\n - They don't look upwards in the tree.\n - If there are multiple downwards paths of different lengths, only one of\n   the paths is actually considered for the depth check since commit\n   28d82dc1c4ed (\"epoll: limit paths\").\n\nEssentially, the current recursion depth check in ep_loop_check_proc() just\nserves to prevent it from recursing too deeply while checking for loops.\n\nA more thorough check is done in reverse_path_check() after the new graph\nedge has already been created; this checks, among other things, that no\npaths going upwards from any non-epoll file with a length of more than 5\nedges exist. However, this check does not apply to non-epoll files.\n\nAs a result, it is possible to recurse to a depth of at least roughly 500,\ntested on v6.15. (I am unsure if deeper recursion is possible; and this may\nhave changed with commit 8c44dac8add7 (\"eventpoll: Fix priority inversion\nproblem\").)\n\nTo fix it:\n\n1. In ep_loop_check_proc(), note the subtree depth of each visited node,\nand use subtree depths for the total depth calculation even when a subtree\nhas already been visited.\n2. Add ep_get_upwards_depth_proc() for similarly determining the maximum\ndepth of an upwards walk.\n3. In ep_loop_check(), use these values to limit the total path length\nbetween epoll nodes to EP_MAX_NESTS edges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38613",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/19dedd4f70f5a6505e7c601ef7dd40542d1d9aa5",
          "name" : "https://git.kernel.org/stable/c/19dedd4f70f5a6505e7c601ef7dd40542d1d9aa5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a739d3b13bff0dfa1aec679d08c7062131a2a425",
          "name" : "https://git.kernel.org/stable/c/a739d3b13bff0dfa1aec679d08c7062131a2a425",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: gpib: fix unset padding field copy back to userspace\n\nThe introduction of a padding field in the gpib_board_info_ioctl is\nshowing up as initialized data on the stack frame being copyied back\nto userspace in function board_info_ioctl. The simplest fix is to\ninitialize the entire struct to zero to ensure all unassigned padding\nfields are zero'd before being copied back to userspace."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38612",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/47b3d6e8921bbb7b65c2dab8eaa8864901848c1c",
          "name" : "https://git.kernel.org/stable/c/47b3d6e8921bbb7b65c2dab8eaa8864901848c1c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6771f121ae87490ddc19eabb7450383af9e01b6d",
          "name" : "https://git.kernel.org/stable/c/6771f121ae87490ddc19eabb7450383af9e01b6d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6f9e2cf9e9c1a891a683329af35bb33ed9d38b5f",
          "name" : "https://git.kernel.org/stable/c/6f9e2cf9e9c1a891a683329af35bb33ed9d38b5f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a3177955f8da3c826a18b75e54881e2e9a9c96f1",
          "name" : "https://git.kernel.org/stable/c/a3177955f8da3c826a18b75e54881e2e9a9c96f1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b31cf6f7716a5d3e4461763f32d812acdaec6e74",
          "name" : "https://git.kernel.org/stable/c/b31cf6f7716a5d3e4461763f32d812acdaec6e74",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/eb2cb7dab60f9be0b435ac4a674255429a36d72c",
          "name" : "https://git.kernel.org/stable/c/eb2cb7dab60f9be0b435ac4a674255429a36d72c",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: fbtft: fix potential memory leak in fbtft_framebuffer_alloc()\n\nIn the error paths after fb_info structure is successfully allocated,\nthe memory allocated in fb_deferred_io_init() for info->pagerefs is not\nfreed. Fix that by adding the cleanup function on the error path."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38611",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/6696a46f4ebdc7314ff23a2fb0e93a95da2c45ee",
          "name" : "https://git.kernel.org/stable/c/6696a46f4ebdc7314ff23a2fb0e93a95da2c45ee",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7624fe66a0832eb6fe4e465fcdd4f9104fb9b339",
          "name" : "https://git.kernel.org/stable/c/7624fe66a0832eb6fe4e465fcdd4f9104fb9b339",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/87f8f8654e55cf9327cc63746595085a041699dc",
          "name" : "https://git.kernel.org/stable/c/87f8f8654e55cf9327cc63746595085a041699dc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/94112b0d443e0b6b5bb17854f97c1498064cc9ed",
          "name" : "https://git.kernel.org/stable/c/94112b0d443e0b6b5bb17854f97c1498064cc9ed",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bfb4cf9fb97e4063f0aa62e9e398025fb6625031",
          "name" : "https://git.kernel.org/stable/c/bfb4cf9fb97e4063f0aa62e9e398025fb6625031",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bfd6b211fe8aae79acbedd19e8d5bea5d062a41b",
          "name" : "https://git.kernel.org/stable/c/bfd6b211fe8aae79acbedd19e8d5bea5d062a41b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nvmci: Prevent the dispatching of uninitialized payloads\n\nThe reproducer executes the host's unlocked_ioctl call in two different\ntasks. When init_context fails, the struct vmci_event_ctx is not fully\ninitialized when executing vmci_datagram_dispatch() to send events to all\nvm contexts. This affects the datagram taken from the datagram queue of\nits context by another task, because the datagram payload is not initialized\naccording to the size payload_size, which causes the kernel data to leak\nto the user space.\n\nBefore dispatching the datagram, and before setting the payload content,\nexplicitly set the payload content to 0 to avoid data leakage caused by\nincomplete payload initialization."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38610",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/27914f2b795e2b58e9506f281dcdd98fef09d3c2",
          "name" : "https://git.kernel.org/stable/c/27914f2b795e2b58e9506f281dcdd98fef09d3c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/27e0318f0ea69fcfa32228847debc384ade14578",
          "name" : "https://git.kernel.org/stable/c/27e0318f0ea69fcfa32228847debc384ade14578",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2fd001a0075ac01dc64a28a8e21226b3d989a91d",
          "name" : "https://git.kernel.org/stable/c/2fd001a0075ac01dc64a28a8e21226b3d989a91d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/46dc57406887dd02565cb264224194a6776d882b",
          "name" : "https://git.kernel.org/stable/c/46dc57406887dd02565cb264224194a6776d882b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8374ac7d69a57d737e701a851ffe980a0d27d3ad",
          "name" : "https://git.kernel.org/stable/c/8374ac7d69a57d737e701a851ffe980a0d27d3ad",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c6ec27091cf5ac05094c1fe3a6ce914cf711a37c",
          "name" : "https://git.kernel.org/stable/c/c6ec27091cf5ac05094c1fe3a6ce914cf711a37c",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\npowercap: dtpm_cpu: Fix NULL pointer dereference in get_pd_power_uw()\n\nThe get_pd_power_uw() function can crash with a NULL pointer dereference\nwhen em_cpu_get() returns NULL. This occurs when a CPU becomes impossible\nduring runtime, causing get_cpu_device() to return NULL, which propagates\nthrough em_cpu_get() and leads to a crash when em_span_cpus() dereferences\nthe NULL pointer.\n\nAdd a NULL check after em_cpu_get() and return 0 if unavailable,\nmatching the existing fallback behavior in __dtpm_cpu_setup().\n\n[ rjw: Drop an excess empty code line ]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38609",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/2731c68f536fddcb71332db7f8d78c5eb4684c04",
          "name" : "https://git.kernel.org/stable/c/2731c68f536fddcb71332db7f8d78c5eb4684c04",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/631e101728df2a86b8fb761b49fad9712c651f8a",
          "name" : "https://git.kernel.org/stable/c/631e101728df2a86b8fb761b49fad9712c651f8a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/75323a49aa603cf5484a6d74d0d329e86d756e11",
          "name" : "https://git.kernel.org/stable/c/75323a49aa603cf5484a6d74d0d329e86d756e11",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/81f50619370045120c133bfdda5b320c8c97d41e",
          "name" : "https://git.kernel.org/stable/c/81f50619370045120c133bfdda5b320c8c97d41e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bab7834c03820eb11269bc48f07c3800192460d2",
          "name" : "https://git.kernel.org/stable/c/bab7834c03820eb11269bc48f07c3800192460d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d5632359dbc44862fc1ed04093c1f57529830261",
          "name" : "https://git.kernel.org/stable/c/d5632359dbc44862fc1ed04093c1f57529830261",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nPM / devfreq: Check governor before using governor->name\n\nCommit 96ffcdf239de (\"PM / devfreq: Remove redundant governor_name from\nstruct devfreq\") removes governor_name and uses governor->name to replace\nit. But devfreq->governor may be NULL and directly using\ndevfreq->governor->name may cause null pointer exception. Move the check of\ngovernor to before using governor->name."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38608",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0e853c1464bcf61207f8b5c32d2ac5ee495e859d",
          "name" : "https://git.kernel.org/stable/c/0e853c1464bcf61207f8b5c32d2ac5ee495e859d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/16aca8bb4ad0d8a13c8b6da4007f4e52d53035bb",
          "name" : "https://git.kernel.org/stable/c/16aca8bb4ad0d8a13c8b6da4007f4e52d53035bb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/178f6a5c8cb3b6be1602de0964cd440243f493c9",
          "name" : "https://git.kernel.org/stable/c/178f6a5c8cb3b6be1602de0964cd440243f493c9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1e480387d4b42776f8957fb148af9d75ce93b96d",
          "name" : "https://git.kernel.org/stable/c/1e480387d4b42776f8957fb148af9d75ce93b96d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/90d6ef67440cec2a0aad71a0108c8f216437345c",
          "name" : "https://git.kernel.org/stable/c/90d6ef67440cec2a0aad71a0108c8f216437345c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ee03766d79de0f61ea29ffb6ab1c7b196ea1b02e",
          "name" : "https://git.kernel.org/stable/c/ee03766d79de0f61ea29ffb6ab1c7b196ea1b02e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, ktls: Fix data corruption when using bpf_msg_pop_data() in ktls\n\nWhen sending plaintext data, we initially calculated the corresponding\nciphertext length. However, if we later reduced the plaintext data length\nvia socket policy, we failed to recalculate the ciphertext length.\n\nThis results in transmitting buffers containing uninitialized data during\nciphertext transmission.\n\nThis causes uninitialized bytes to be appended after a complete\n\"Application Data\" packet, leading to errors on the receiving end when\nparsing TLS record."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38607",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/261b30ad1516f4b9edd500aa6e8d6315c8fc109a",
          "name" : "https://git.kernel.org/stable/c/261b30ad1516f4b9edd500aa6e8d6315c8fc109a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3157f7e2999616ac91f4d559a8566214f74000a5",
          "name" : "https://git.kernel.org/stable/c/3157f7e2999616ac91f4d559a8566214f74000a5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/65eb166b8636365ad3d6e36d50a7c5edfe6cc66e",
          "name" : "https://git.kernel.org/stable/c/65eb166b8636365ad3d6e36d50a7c5edfe6cc66e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: handle jset (if a & b ...) as a jump in CFG computation\n\nBPF_JSET is a conditional jump and currently verifier.c:can_jump()\ndoes not know about that. This can lead to incorrect live registers\nand SCC computation.\n\nE.g. in the following example:\n\n   1: r0 = 1;\n   2: r2 = 2;\n   3: if r1 & 0x7 goto +1;\n   4: exit;\n   5: r0 = r2;\n   6: exit;\n\nW/o this fix insn_successors(3) will return only (4), a jump to (5)\nwould be missed and r2 won't be marked as alive at (3)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38606",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1259b6da8303f70fef6ed4aef8ae3dedfecb0f27",
          "name" : "https://git.kernel.org/stable/c/1259b6da8303f70fef6ed4aef8ae3dedfecb0f27",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/36670b67de18f1e5d34900c5d2ac60a8970c293c",
          "name" : "https://git.kernel.org/stable/c/36670b67de18f1e5d34900c5d2ac60a8970c293c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9b861dfc5c07defd0191fd3e7288a3179cd9a02e",
          "name" : "https://git.kernel.org/stable/c/9b861dfc5c07defd0191fd3e7288a3179cd9a02e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Avoid accessing uninitialized arvif->ar during beacon miss\n\nDuring beacon miss handling, ath12k driver iterates over active virtual\ninterfaces (vifs) and attempts to access the radio object (ar) via\narvif->deflink->ar.\n\nHowever, after commit aa80f12f3bed (\"wifi: ath12k: defer vdev creation for\nMLO\"), arvif is linked to a radio only after vdev creation, typically when\na channel is assigned or a scan is requested.\nFor P2P capable devices, a default P2P interface is created by\nwpa_supplicant along with regular station interfaces, these serve as dummy\ninterfaces for P2P-capable stations, lack an associated netdev and initiate\nfrequent scans to discover neighbor p2p devices. When a scan is initiated\non such P2P vifs, driver selects destination radio (ar) based on scan\nfrequency, creates a scan vdev, and attaches arvif to the radio. Once the\nscan completes or is aborted, the scan vdev is deleted, detaching arvif\nfrom the radio and leaving arvif->ar uninitialized.\n\nWhile handling beacon miss for station interfaces, P2P interface is also\nencountered in the vif iteration and ath12k_mac_handle_beacon_miss_iter()\ntries to dereference the uninitialized arvif->deflink->ar.\n\nFix this by verifying that vdev is created for the arvif before accessing\nits ar during beacon miss handling and similar vif iterator callbacks.\n\n==========================================================================\n wlp6s0: detected beacon loss from AP (missed 7 beacons) - probing\n KASAN: null-ptr-deref in range [0x0000000000000010-0x0000000000000017]\n\n CPU: 5 UID: 0 PID: 0 Comm: swapper/5 Not tainted 6.16.0-rc1-wt-ath+ #2 PREEMPT(full)\n RIP: 0010:ath12k_mac_handle_beacon_miss_iter+0xb5/0x1a0 [ath12k]\n Call Trace:\n  __iterate_interfaces+0x11a/0x410 [mac80211]\n  ieee80211_iterate_active_interfaces_atomic+0x61/0x140 [mac80211]\n  ath12k_mac_handle_beacon_miss+0xa1/0xf0 [ath12k]\n  ath12k_roam_event+0x393/0x560 [ath12k]\n  ath12k_wmi_op_rx+0x1486/0x28c0 [ath12k]\n  ath12k_htc_process_trailer.isra.0+0x2fb/0x620 [ath12k]\n  ath12k_htc_rx_completion_handler+0x448/0x830 [ath12k]\n  ath12k_ce_recv_process_cb+0x549/0x9e0 [ath12k]\n  ath12k_ce_per_engine_service+0xbe/0xf0 [ath12k]\n  ath12k_pci_ce_workqueue+0x69/0x120 [ath12k]\n  process_one_work+0xe3a/0x1430\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.4.1-00199-QCAHKSWPL_SILICONZ-1\nTested-on: WCN7850 hw2.0 PCI WLAN.HMT.1.1.c5-00284.1-QCAHMTSWPL_V1.0_V2.0_SILICONZ-3"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38605",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/05062834350f0bf7ad1abcebc2807220e90220eb",
          "name" : "https://git.kernel.org/stable/c/05062834350f0bf7ad1abcebc2807220e90220eb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b508f370f88f277c95e2bd3bc47217a96d668cee",
          "name" : "https://git.kernel.org/stable/c/b508f370f88f277c95e2bd3bc47217a96d668cee",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ee4f8e7fa578f9f28cef5f409677db25f4f83d7e",
          "name" : "https://git.kernel.org/stable/c/ee4f8e7fa578f9f28cef5f409677db25f4f83d7e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath12k: Pass ab pointer directly to ath12k_dp_tx_get_encap_type()\n\nIn ath12k_dp_tx_get_encap_type(), the arvif parameter is only used to\nretrieve the ab pointer. In vdev delete sequence the arvif->ar could\nbecome NULL and that would trigger kernel panic.\nSince the caller ath12k_dp_tx() already has a valid ab pointer, pass it\ndirectly to avoid panic and unnecessary dereferencing.\n\nPC points to \"ath12k_dp_tx+0x228/0x988 [ath12k]\"\nLR points to \"ath12k_dp_tx+0xc8/0x988 [ath12k]\".\nThe Backtrace obtained is as follows:\nath12k_dp_tx+0x228/0x988 [ath12k]\nath12k_mac_tx_check_max_limit+0x608/0x920 [ath12k]\nieee80211_process_measurement_req+0x320/0x348 [mac80211]\nieee80211_tx_dequeue+0x9ac/0x1518 [mac80211]\nieee80211_tx_dequeue+0xb14/0x1518 [mac80211]\nieee80211_tx_prepare_skb+0x224/0x254 [mac80211]\nieee80211_xmit+0xec/0x100 [mac80211]\n__ieee80211_subif_start_xmit+0xc50/0xf40 [mac80211]\nieee80211_subif_start_xmit+0x2e8/0x308 [mac80211]\nnetdev_start_xmit+0x150/0x18c\ndev_hard_start_xmit+0x74/0xc0\n\nTested-on: QCN9274 hw2.0 PCI WLAN.WBE.1.3.1-00173-QCAHKSWPL_SILICONZ-1"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38604",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/14ca6952691fa8cc91e7644512e6ff24a595283f",
          "name" : "https://git.kernel.org/stable/c/14ca6952691fa8cc91e7644512e6ff24a595283f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/16d8fd74dbfca0ea58645cd2fca13be10cae3cdd",
          "name" : "https://git.kernel.org/stable/c/16d8fd74dbfca0ea58645cd2fca13be10cae3cdd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7858a95566f4ebf59524666683d2dcdba3fca968",
          "name" : "https://git.kernel.org/stable/c/7858a95566f4ebf59524666683d2dcdba3fca968",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/81cfe34d0630de4e23ae804dcc08fb6f861dc37d",
          "name" : "https://git.kernel.org/stable/c/81cfe34d0630de4e23ae804dcc08fb6f861dc37d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8c767727f331fb9455b0f81daad832b5925688cb",
          "name" : "https://git.kernel.org/stable/c/8c767727f331fb9455b0f81daad832b5925688cb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c51a45ad9070a6d296174fcbe5c466352836c12b",
          "name" : "https://git.kernel.org/stable/c/c51a45ad9070a6d296174fcbe5c466352836c12b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtl818x: Kill URBs before clearing tx status queue\n\nIn rtl8187_stop() move the call of usb_kill_anchored_urbs() before clearing\nb_tx_status.queue. This change prevents callbacks from using already freed\nskb due to anchor was not killed before freeing such skb.\n\n BUG: kernel NULL pointer dereference, address: 0000000000000080\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 0 P4D 0\n Oops: Oops: 0000 [#1] SMP NOPTI\n CPU: 7 UID: 0 PID: 0 Comm: swapper/7 Not tainted 6.15.0 #8 PREEMPT(voluntary)\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 0.0.0 02/06/2015\n RIP: 0010:ieee80211_tx_status_irqsafe+0x21/0xc0 [mac80211]\n Call Trace:\n  <IRQ>\n  rtl8187_tx_cb+0x116/0x150 [rtl8187]\n  __usb_hcd_giveback_urb+0x9d/0x120\n  usb_giveback_urb_bh+0xbb/0x140\n  process_one_work+0x19b/0x3c0\n  bh_worker+0x1a7/0x210\n  tasklet_action+0x10/0x30\n  handle_softirqs+0xf0/0x340\n  __irq_exit_rcu+0xcd/0xf0\n  common_interrupt+0x85/0xa0\n  </IRQ>\n\nTested on RTL8187BvE device.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38603",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5fb90421fa0fbe0a968274912101fe917bf1c47b",
          "name" : "https://git.kernel.org/stable/c/5fb90421fa0fbe0a968274912101fe917bf1c47b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f2997cef6d4056cb1b62190f1cf06e8dd19e228f",
          "name" : "https://git.kernel.org/stable/c/f2997cef6d4056cb1b62190f1cf06e8dd19e228f",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix slab-use-after-free in amdgpu_userq_mgr_fini+0x70c\n\nThe issue was reproduced on NV10 using IGT pci_unplug test.\nIt is expected that `amdgpu_driver_postclose_kms()` is called prior to `amdgpu_drm_release()`.\nHowever, the bug is that `amdgpu_fpriv` was freed in `amdgpu_driver_postclose_kms()`, and then\nlater accessed in `amdgpu_drm_release()` via a call to `amdgpu_userq_mgr_fini()`.\nAs a result, KASAN detected a use-after-free condition, as shown in the log below.\nThe proposed fix is to move the calls to `amdgpu_eviction_fence_destroy()` and\n`amdgpu_userq_mgr_fini()` into `amdgpu_driver_postclose_kms()`, so they are invoked before\n`amdgpu_fpriv` is freed.\n\nThis also ensures symmetry with the initialization path in `amdgpu_driver_open_kms()`,\nwhere the following components are initialized:\n- `amdgpu_userq_mgr_init()`\n- `amdgpu_eviction_fence_init()`\n- `amdgpu_ctx_mgr_init()`\n\nCorrespondingly, in `amdgpu_driver_postclose_kms()` we should clean up using:\n- `amdgpu_userq_mgr_fini()`\n- `amdgpu_eviction_fence_destroy()`\n- `amdgpu_ctx_mgr_fini()`\n\nThis change eliminates the use-after-free and improves consistency in resource management between open and close paths.\n\n[  +0.094367] ==================================================================\n[  +0.000026] BUG: KASAN: slab-use-after-free in amdgpu_userq_mgr_fini+0x70c/0x730 [amdgpu]\n[  +0.000866] Write of size 8 at addr ffff88811c068c60 by task amd_pci_unplug/1737\n[  +0.000026] CPU: 3 UID: 0 PID: 1737 Comm: amd_pci_unplug Not tainted 6.14.0+ #2\n[  +0.000008] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000004] Call Trace:\n[  +0.000004]  <TASK>\n[  +0.000003]  dump_stack_lvl+0x76/0xa0\n[  +0.000010]  print_report+0xce/0x600\n[  +0.000009]  ? amdgpu_userq_mgr_fini+0x70c/0x730 [amdgpu]\n[  +0.000790]  ? srso_return_thunk+0x5/0x5f\n[  +0.000007]  ? kasan_complete_mode_report_info+0x76/0x200\n[  +0.000008]  ? amdgpu_userq_mgr_fini+0x70c/0x730 [amdgpu]\n[  +0.000684]  kasan_report+0xbe/0x110\n[  +0.000007]  ? amdgpu_userq_mgr_fini+0x70c/0x730 [amdgpu]\n[  +0.000601]  __asan_report_store8_noabort+0x17/0x30\n[  +0.000007]  amdgpu_userq_mgr_fini+0x70c/0x730 [amdgpu]\n[  +0.000801]  ? __pfx_amdgpu_userq_mgr_fini+0x10/0x10 [amdgpu]\n[  +0.000819]  ? srso_return_thunk+0x5/0x5f\n[  +0.000008]  amdgpu_drm_release+0xa3/0xe0 [amdgpu]\n[  +0.000604]  __fput+0x354/0xa90\n[  +0.000010]  __fput_sync+0x59/0x80\n[  +0.000005]  __x64_sys_close+0x7d/0xe0\n[  +0.000006]  x64_sys_call+0x2505/0x26f0\n[  +0.000006]  do_syscall_64+0x7c/0x170\n[  +0.000004]  ? kasan_record_aux_stack+0xae/0xd0\n[  +0.000005]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? kmem_cache_free+0x398/0x580\n[  +0.000006]  ? __fput+0x543/0xa90\n[  +0.000006]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __fput+0x543/0xa90\n[  +0.000004]  ? __kasan_check_read+0x11/0x20\n[  +0.000007]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __kasan_check_read+0x11/0x20\n[  +0.000003]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? fpregs_assert_state_consistent+0x21/0xb0\n[  +0.000006]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? syscall_exit_to_user_mode+0x4e/0x240\n[  +0.000005]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? do_syscall_64+0x88/0x170\n[  +0.000003]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? do_syscall_64+0x88/0x170\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? irqentry_exit+0x43/0x50\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? exc_page_fault+0x7c/0x110\n[  +0.000006]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[  +0.000005] RIP: 0033:0x7ffff7b14f67\n[  +0.000005] Code: ff e8 0d 16 02 00 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 03 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 41 c3 48 83 ec 18 89 7c 24 0c e8 73 ba f7 ff\n[  +0.000004] RSP: 002b:00007fffffffe358 EFLAGS: 00000246 ORIG_RAX: 0000000000000003\n[  +0.000006] RAX: ffffffffff\n---truncated---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38602",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/6663c52608d8d8727bf1911e6d9218069ba1c85e",
          "name" : "https://git.kernel.org/stable/c/6663c52608d8d8727bf1911e6d9218069ba1c85e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/70a1b527eaea9430b1bd87de59f3b9f6bd225701",
          "name" : "https://git.kernel.org/stable/c/70a1b527eaea9430b1bd87de59f3b9f6bd225701",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7dd6350307af6521b6240b295c93b7eec4daebe6",
          "name" : "https://git.kernel.org/stable/c/7dd6350307af6521b6240b295c93b7eec4daebe6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/90a0d9f339960448a3acc1437a46730f975efd6a",
          "name" : "https://git.kernel.org/stable/c/90a0d9f339960448a3acc1437a46730f975efd6a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c0e43c3f6c0a79381b468574c241065998412b7c",
          "name" : "https://git.kernel.org/stable/c/c0e43c3f6c0a79381b468574c241065998412b7c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ca980f1911a7144d451d1c31298ab8507c6bd88f",
          "name" : "https://git.kernel.org/stable/c/ca980f1911a7144d451d1c31298ab8507c6bd88f",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\niwlwifi: Add missing check for alloc_ordered_workqueue\n\nAdd check for the return value of alloc_ordered_workqueue since it may\nreturn NULL pointer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38601",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0ebb5fe494501c19f31270008b26ab95201af6fd",
          "name" : "https://git.kernel.org/stable/c/0ebb5fe494501c19f31270008b26ab95201af6fd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/16872194c80f2724472fc207991712895ac8a230",
          "name" : "https://git.kernel.org/stable/c/16872194c80f2724472fc207991712895ac8a230",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5bf201c55fdf303e79005038648dfa1e8af48f54",
          "name" : "https://git.kernel.org/stable/c/5bf201c55fdf303e79005038648dfa1e8af48f54",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/72a48be1f53942793f3bc68a37fad1f38b53b082",
          "name" : "https://git.kernel.org/stable/c/72a48be1f53942793f3bc68a37fad1f38b53b082",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/916ac18d526a26f6072866b1a97622cf1351ef1c",
          "name" : "https://git.kernel.org/stable/c/916ac18d526a26f6072866b1a97622cf1351ef1c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a5b46aa7cf5f05c213316a018e49a8e086efd98e",
          "name" : "https://git.kernel.org/stable/c/a5b46aa7cf5f05c213316a018e49a8e086efd98e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: ath11k: clear initialized flag for deinit-ed srng lists\n\nIn a number of cases we see kernel panics on resume due\nto ath11k kernel page fault, which happens under the\nfollowing circumstances:\n\n1) First ath11k_hal_dump_srng_stats() call\n\n Last interrupt received for each group:\n ath11k_pci 0000:01:00.0: group_id 0 22511ms before\n ath11k_pci 0000:01:00.0: group_id 1 14440788ms before\n [..]\n ath11k_pci 0000:01:00.0: failed to receive control response completion, polling..\n ath11k_pci 0000:01:00.0: Service connect timeout\n ath11k_pci 0000:01:00.0: failed to connect to HTT: -110\n ath11k_pci 0000:01:00.0: failed to start core: -110\n ath11k_pci 0000:01:00.0: firmware crashed: MHI_CB_EE_RDDM\n ath11k_pci 0000:01:00.0: already resetting count 2\n ath11k_pci 0000:01:00.0: failed to wait wlan mode request (mode 4): -110\n ath11k_pci 0000:01:00.0: qmi failed to send wlan mode off: -110\n ath11k_pci 0000:01:00.0: failed to reconfigure driver on crash recovery\n [..]\n\n2) At this point reconfiguration fails (we have 2 resets) and\n  ath11k_core_reconfigure_on_crash() calls ath11k_hal_srng_deinit()\n  which destroys srng lists.  However, it does not reset per-list\n  ->initialized flag.\n\n3) Second ath11k_hal_dump_srng_stats() call sees stale ->initialized\n  flag and attempts to dump srng stats:\n\n Last interrupt received for each group:\n ath11k_pci 0000:01:00.0: group_id 0 66785ms before\n ath11k_pci 0000:01:00.0: group_id 1 14485062ms before\n ath11k_pci 0000:01:00.0: group_id 2 14485062ms before\n ath11k_pci 0000:01:00.0: group_id 3 14485062ms before\n ath11k_pci 0000:01:00.0: group_id 4 14780845ms before\n ath11k_pci 0000:01:00.0: group_id 5 14780845ms before\n ath11k_pci 0000:01:00.0: group_id 6 14485062ms before\n ath11k_pci 0000:01:00.0: group_id 7 66814ms before\n ath11k_pci 0000:01:00.0: group_id 8 68997ms before\n ath11k_pci 0000:01:00.0: group_id 9 67588ms before\n ath11k_pci 0000:01:00.0: group_id 10 69511ms before\n BUG: unable to handle page fault for address: ffffa007404eb010\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 100000067 P4D 100000067 PUD 10022d067 PMD 100b01067 PTE 0\n Oops: 0000 [#1] PREEMPT SMP NOPTI\n RIP: 0010:ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k]\n Call Trace:\n <TASK>\n ? __die_body+0xae/0xb0\n ? page_fault_oops+0x381/0x3e0\n ? exc_page_fault+0x69/0xa0\n ? asm_exc_page_fault+0x22/0x30\n ? ath11k_hal_dump_srng_stats+0x2b4/0x3b0 [ath11k (HASH:6cea 4)]\n ath11k_qmi_driver_event_work+0xbd/0x1050 [ath11k (HASH:6cea 4)]\n worker_thread+0x389/0x930\n kthread+0x149/0x170\n\nClear per-list ->initialized flag in ath11k_hal_srng_deinit()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38600",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/4d80d4fa986c5da99042b66bf30a028e7f564156",
          "name" : "https://git.kernel.org/stable/c/4d80d4fa986c5da99042b66bf30a028e7f564156",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b3a431fe2e399b2e0cc5f43f7e9d63d63d3710ee",
          "name" : "https://git.kernel.org/stable/c/b3a431fe2e399b2e0cc5f43f7e9d63d63d3710ee",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7925: fix off by one in mt7925_mcu_hw_scan()\n\nThe ssid->ssids[] and sreq->ssids[] arrays have MT7925_RNR_SCAN_MAX_BSSIDS\nelements so this >= needs to be > to prevent an out of bounds access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38599",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/64cbf0d7ce9afe20666da90ec6ecaec6ba5ac64b",
          "name" : "https://git.kernel.org/stable/c/64cbf0d7ce9afe20666da90ec6ecaec6ba5ac64b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f43e7d8ae4b6a73213032545552bab26f76f113a",
          "name" : "https://git.kernel.org/stable/c/f43e7d8ae4b6a73213032545552bab26f76f113a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f82eabd0ff8067d1ee95515f4174c9a9569d54cb",
          "name" : "https://git.kernel.org/stable/c/f82eabd0ff8067d1ee95515f4174c9a9569d54cb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7996: Fix possible OOB access in mt7996_tx()\n\nFis possible Out-Of-Boundary access in mt7996_tx routine if link_id is\nset to IEEE80211_LINK_UNSPECIFIED"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38598",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a",
          "name" : "https://git.kernel.org/stable/c/96f663ae897b3e6ac17ced1d9b9c2ae9f165ad9a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a886d26f2c8f9e3f3c1869ae368d09c75daac553",
          "name" : "https://git.kernel.org/stable/c/a886d26f2c8f9e3f3c1869ae368d09c75daac553",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: fix use-after-free in amdgpu_userq_suspend+0x51a/0x5a0\n\n[  +0.000020] BUG: KASAN: slab-use-after-free in amdgpu_userq_suspend+0x51a/0x5a0 [amdgpu]\n[  +0.000817] Read of size 8 at addr ffff88812eec8c58 by task amd_pci_unplug/1733\n\n[  +0.000027] CPU: 10 UID: 0 PID: 1733 Comm: amd_pci_unplug Tainted: G        W          6.14.0+ #2\n[  +0.000009] Tainted: [W]=WARN\n[  +0.000003] Hardware name: ASUS System Product Name/ROG STRIX B550-F GAMING (WI-FI), BIOS 1401 12/03/2020\n[  +0.000004] Call Trace:\n[  +0.000004]  <TASK>\n[  +0.000003]  dump_stack_lvl+0x76/0xa0\n[  +0.000011]  print_report+0xce/0x600\n[  +0.000009]  ? srso_return_thunk+0x5/0x5f\n[  +0.000006]  ? kasan_complete_mode_report_info+0x76/0x200\n[  +0.000007]  ? kasan_addr_to_slab+0xd/0xb0\n[  +0.000006]  ? amdgpu_userq_suspend+0x51a/0x5a0 [amdgpu]\n[  +0.000707]  kasan_report+0xbe/0x110\n[  +0.000006]  ? amdgpu_userq_suspend+0x51a/0x5a0 [amdgpu]\n[  +0.000541]  __asan_report_load8_noabort+0x14/0x30\n[  +0.000005]  amdgpu_userq_suspend+0x51a/0x5a0 [amdgpu]\n[  +0.000535]  ? stop_cpsch+0x396/0x600 [amdgpu]\n[  +0.000556]  ? stop_cpsch+0x429/0x600 [amdgpu]\n[  +0.000536]  ? __pfx_amdgpu_userq_suspend+0x10/0x10 [amdgpu]\n[  +0.000536]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? kgd2kfd_suspend+0x132/0x1d0 [amdgpu]\n[  +0.000542]  amdgpu_device_fini_hw+0x581/0xe90 [amdgpu]\n[  +0.000485]  ? down_write+0xbb/0x140\n[  +0.000007]  ? __mutex_unlock_slowpath.constprop.0+0x317/0x360\n[  +0.000005]  ? __pfx_amdgpu_device_fini_hw+0x10/0x10 [amdgpu]\n[  +0.000482]  ? __kasan_check_write+0x14/0x30\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? up_write+0x55/0xb0\n[  +0.000007]  ? srso_return_thunk+0x5/0x5f\n[  +0.000005]  ? blocking_notifier_chain_unregister+0x6c/0xc0\n[  +0.000008]  amdgpu_driver_unload_kms+0x69/0x90 [amdgpu]\n[  +0.000484]  amdgpu_pci_remove+0x93/0x130 [amdgpu]\n[  +0.000482]  pci_device_remove+0xae/0x1e0\n[  +0.000008]  device_remove+0xc7/0x180\n[  +0.000008]  device_release_driver_internal+0x3d4/0x5a0\n[  +0.000007]  device_release_driver+0x12/0x20\n[  +0.000004]  pci_stop_bus_device+0x104/0x150\n[  +0.000006]  pci_stop_and_remove_bus_device_locked+0x1b/0x40\n[  +0.000005]  remove_store+0xd7/0xf0\n[  +0.000005]  ? __pfx_remove_store+0x10/0x10\n[  +0.000006]  ? __pfx__copy_from_iter+0x10/0x10\n[  +0.000006]  ? __pfx_dev_attr_store+0x10/0x10\n[  +0.000006]  dev_attr_store+0x3f/0x80\n[  +0.000006]  sysfs_kf_write+0x125/0x1d0\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000005]  ? __kasan_check_write+0x14/0x30\n[  +0.000005]  kernfs_fop_write_iter+0x2ea/0x490\n[  +0.000005]  ? rw_verify_area+0x70/0x420\n[  +0.000005]  ? __pfx_kernfs_fop_write_iter+0x10/0x10\n[  +0.000006]  vfs_write+0x90d/0xe70\n[  +0.000005]  ? srso_return_thunk+0x5/0x5f\n[  +0.000005]  ? __pfx_vfs_write+0x10/0x10\n[  +0.000004]  ? local_clock+0x15/0x30\n[  +0.000008]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __kasan_slab_free+0x5f/0x80\n[  +0.000005]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __kasan_check_read+0x11/0x20\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? fdget_pos+0x1d3/0x500\n[  +0.000007]  ksys_write+0x119/0x220\n[  +0.000005]  ? putname+0x1c/0x30\n[  +0.000006]  ? __pfx_ksys_write+0x10/0x10\n[  +0.000007]  __x64_sys_write+0x72/0xc0\n[  +0.000006]  x64_sys_call+0x18ab/0x26f0\n[  +0.000006]  do_syscall_64+0x7c/0x170\n[  +0.000004]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __pfx___x64_sys_openat+0x10/0x10\n[  +0.000006]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? __kasan_check_read+0x11/0x20\n[  +0.000003]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? fpregs_assert_state_consistent+0x21/0xb0\n[  +0.000006]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? syscall_exit_to_user_mode+0x4e/0x240\n[  +0.000005]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? do_syscall_64+0x88/0x170\n[  +0.000003]  ? srso_return_thunk+0x5/0x5f\n[  +0.000004]  ? irqentry_exit+0x43/0x50\n[  +0.000004]  ? srso_return_thunk+0x5\n---truncated---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38597",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/38682edbbad272b5f8c7bf55128b42cd10626f73",
          "name" : "https://git.kernel.org/stable/c/38682edbbad272b5f8c7bf55128b42cd10626f73",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e1eef239399927b368f70a716044fb10085627c8",
          "name" : "https://git.kernel.org/stable/c/e1eef239399927b368f70a716044fb10085627c8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f9f68bf1d0efeadb6c427c9dbb30f307a7def19b",
          "name" : "https://git.kernel.org/stable/c/f9f68bf1d0efeadb6c427c9dbb30f307a7def19b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/rockchip: vop2: fail cleanly if missing a primary plane for a video-port\n\nEach window of a vop2 is usable by a specific set of video ports, so while\nbinding the vop2, we look through the list of available windows trying to\nfind one designated as primary-plane and usable by that specific port.\n\nThe code later wants to use drm_crtc_init_with_planes with that found\nprimary plane, but nothing has checked so far if a primary plane was\nactually found.\n\nFor whatever reason, the rk3576 vp2 does not have a usable primary window\n(if vp0 is also in use) which brought the issue to light and ended in a\nnull-pointer dereference further down.\n\nAs we expect a primary-plane to exist for a video-port, add a check at\nthe end of the window-iteration and fail probing if none was found."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38596",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5f2be12442db6a2904e6e31b0e3b5ad5aebf868b",
          "name" : "https://git.kernel.org/stable/c/5f2be12442db6a2904e6e31b0e3b5ad5aebf868b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fe69a391808404977b1f002a6e7447de3de7a88e",
          "name" : "https://git.kernel.org/stable/c/fe69a391808404977b1f002a6e7447de3de7a88e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/panthor: Fix UAF in panthor_gem_create_with_handle() debugfs code\n\nThe object is potentially already gone after the drm_gem_object_put().\nIn general the object should be fully constructed before calling\ndrm_gem_handle_create(), except the debugfs tracking uses a separate\nlock and list and separate flag to denotate whether the object is\nactually initialized.\n\nSince I'm touching this all anyway simplify this by only adding the\nobject to the debugfs when it's ready for that, which allows us to\ndelete that separate flag. panthor_gem_debugfs_bo_rm() already checks\nwhether we've actually been added to the list or this is some error\npath cleanup.\n\nv2: Fix build issues for !CONFIG_DEBUGFS (Adrián)\n\nv3: Add linebreak and remove outdated comment (Liviu)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38595",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3edfd2353f301bfffd5ee41066e37320a59ccc2d",
          "name" : "https://git.kernel.org/stable/c/3edfd2353f301bfffd5ee41066e37320a59ccc2d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/532c8b51b3a8676cbf533a291f8156774f30ea87",
          "name" : "https://git.kernel.org/stable/c/532c8b51b3a8676cbf533a291f8156774f30ea87",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d59d49af4aeed9a81e673e37c26c6a3bacf1a181",
          "name" : "https://git.kernel.org/stable/c/d59d49af4aeed9a81e673e37c26c6a3bacf1a181",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e5907885260401bba300d4d18d79875c05b82651",
          "name" : "https://git.kernel.org/stable/c/e5907885260401bba300d4d18d79875c05b82651",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nxen: fix UAF in dmabuf_exp_from_pages()\n\n[dma_buf_fd() fixes; no preferences regarding the tree it goes through -\nup to xen folks]\n\nAs soon as we'd inserted a file reference into descriptor table, another\nthread could close it.  That's fine for the case when all we are doing is\nreturning that descriptor to userland (it's a race, but it's a userland\nrace and there's nothing the kernel can do about it).  However, if we\nfollow fd_install() with any kind of access to objects that would be\ndestroyed on close (be it the struct file itself or anything destroyed\nby its ->release()), we have a UAF.\n\ndma_buf_fd() is a combination of reserving a descriptor and fd_install().\ngntdev dmabuf_exp_from_pages() calls it and then proceeds to access the\nobjects destroyed on close - starting with gntdev_dmabuf itself.\n\nFix that by doing reserving descriptor before anything else and do\nfd_install() only when everything had been set up."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38594",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/c68332b7ee893292bba6e87d31ef2080c066c65d",
          "name" : "https://git.kernel.org/stable/c/c68332b7ee893292bba6e87d31ef2080c066c65d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f0b9d31c6edd50a6207489cd1bd4ddac814b9cd2",
          "name" : "https://git.kernel.org/stable/c/f0b9d31c6edd50a6207489cd1bd4ddac814b9cd2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\niommu/vt-d: Fix UAF on sva unbind with pending IOPFs\n\nCommit 17fce9d2336d (\"iommu/vt-d: Put iopf enablement in domain attach\npath\") disables IOPF on device by removing the device from its IOMMU's\nIOPF queue when the last IOPF-capable domain is detached from the device.\nUnfortunately, it did this in a wrong place where there are still pending\nIOPFs. As a result, a use-after-free error is potentially triggered and\neventually a kernel panic with a kernel trace similar to the following:\n\n refcount_t: underflow; use-after-free.\n WARNING: CPU: 3 PID: 313 at lib/refcount.c:28 refcount_warn_saturate+0xd8/0xe0\n Workqueue: iopf_queue/dmar0-iopfq iommu_sva_handle_iopf\n Call Trace:\n   <TASK>\n   iopf_free_group+0xe/0x20\n   process_one_work+0x197/0x3d0\n   worker_thread+0x23a/0x350\n   ? rescuer_thread+0x4a0/0x4a0\n   kthread+0xf8/0x230\n   ? finish_task_switch.isra.0+0x81/0x260\n   ? kthreads_online_cpu+0x110/0x110\n   ? kthreads_online_cpu+0x110/0x110\n   ret_from_fork+0x13b/0x170\n   ? kthreads_online_cpu+0x110/0x110\n   ret_from_fork_asm+0x11/0x20\n   </TASK>\n  ---[ end trace 0000000000000000 ]---\n\nThe intel_pasid_tear_down_entry() function is responsible for blocking\nhardware from generating new page faults and flushing all in-flight\nones. Therefore, moving iopf_for_domain_remove() after this function\nshould resolve this."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38593",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/16852eccbdfaf41a666705e3f8be55cf2864c5ca",
          "name" : "https://git.kernel.org/stable/c/16852eccbdfaf41a666705e3f8be55cf2864c5ca",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2935e556850e9c94d7a00adf14d3cd7fe406ac03",
          "name" : "https://git.kernel.org/stable/c/2935e556850e9c94d7a00adf14d3cd7fe406ac03",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a351ff6b8ecca4229afaa0d98042bead8de64799",
          "name" : "https://git.kernel.org/stable/c/a351ff6b8ecca4229afaa0d98042bead8de64799",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f8069f34c4c976786ded97498012225af87435d7",
          "name" : "https://git.kernel.org/stable/c/f8069f34c4c976786ded97498012225af87435d7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_sync: fix double free in 'hci_discovery_filter_clear()'\n\nFunction 'hci_discovery_filter_clear()' frees 'uuids' array and then\nsets it to NULL. There is a tiny chance of the following race:\n\n'hci_cmd_sync_work()'\n\n 'update_passive_scan_sync()'\n\n   'hci_update_passive_scan_sync()'\n\n     'hci_discovery_filter_clear()'\n       kfree(uuids);\n\n       <-------------------------preempted-------------------------------->\n                                           'start_service_discovery()'\n\n                                             'hci_discovery_filter_clear()'\n                                               kfree(uuids); // DOUBLE FREE\n\n       <-------------------------preempted-------------------------------->\n\n      uuids = NULL;\n\nTo fix it let's add locking around 'kfree()' call and NULL pointer\nassignment. Otherwise the following backtrace fires:\n\n[ ] ------------[ cut here ]------------\n[ ] kernel BUG at mm/slub.c:547!\n[ ] Internal error: Oops - BUG: 00000000f2000800 [#1] PREEMPT SMP\n[ ] CPU: 3 UID: 0 PID: 246 Comm: bluetoothd Tainted: G O 6.12.19-kernel #1\n[ ] Tainted: [O]=OOT_MODULE\n[ ] pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ ] pc : __slab_free+0xf8/0x348\n[ ] lr : __slab_free+0x48/0x348\n...\n[ ] Call trace:\n[ ]  __slab_free+0xf8/0x348\n[ ]  kfree+0x164/0x27c\n[ ]  start_service_discovery+0x1d0/0x2c0\n[ ]  hci_sock_sendmsg+0x518/0x924\n[ ]  __sock_sendmsg+0x54/0x60\n[ ]  sock_write_iter+0x98/0xf8\n[ ]  do_iter_readv_writev+0xe4/0x1c8\n[ ]  vfs_writev+0x128/0x2b0\n[ ]  do_writev+0xfc/0x118\n[ ]  __arm64_sys_writev+0x20/0x2c\n[ ]  invoke_syscall+0x68/0xf0\n[ ]  el0_svc_common.constprop.0+0x40/0xe0\n[ ]  do_el0_svc+0x1c/0x28\n[ ]  el0_svc+0x30/0xd0\n[ ]  el0t_64_sync_handler+0x100/0x12c\n[ ]  el0t_64_sync+0x194/0x198\n[ ] Code: 8b0002e6 eb17031f 54fffbe1 d503201f (d4210000)\n[ ] ---[ end trace 0000000000000000 ]---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38592",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/7af4d7b53502286c6cf946d397ab183e76d14820",
          "name" : "https://git.kernel.org/stable/c/7af4d7b53502286c6cf946d397ab183e76d14820",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8c021ad797f9171d015cf0a932a3fbe5232190f5",
          "name" : "https://git.kernel.org/stable/c/8c021ad797f9171d015cf0a932a3fbe5232190f5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/efd55f6a59449f8d4e4953f12c177aa902b7451f",
          "name" : "https://git.kernel.org/stable/c/efd55f6a59449f8d4e4953f12c177aa902b7451f",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_devcd_dump: fix out-of-bounds via dev_coredumpv\n\nCurrently both dev_coredumpv and skb_put_data in hci_devcd_dump use\nhdev->dump.head. However, dev_coredumpv can free the buffer. From\ndev_coredumpm_timeout documentation, which is used by dev_coredumpv:\n\n    > Creates a new device coredump for the given device. If a previous one hasn't\n    > been read yet, the new coredump is discarded. The data lifetime is determined\n    > by the device coredump framework and when it is no longer needed the @free\n    > function will be called to free the data.\n\nIf the data has not been read by the userspace yet, dev_coredumpv will\ndiscard new buffer, freeing hdev->dump.head. This leads to\nvmalloc-out-of-bounds error when skb_put_data tries to access\nhdev->dump.head.\n\nA crash report from syzbot illustrates this:\n\n    ==================================================================\n    BUG: KASAN: vmalloc-out-of-bounds in skb_put_data\n    include/linux/skbuff.h:2752 [inline]\n    BUG: KASAN: vmalloc-out-of-bounds in hci_devcd_dump+0x142/0x240\n    net/bluetooth/coredump.c:258\n    Read of size 140 at addr ffffc90004ed5000 by task kworker/u9:2/5844\n\n    CPU: 1 UID: 0 PID: 5844 Comm: kworker/u9:2 Not tainted\n    6.14.0-syzkaller-10892-g4e82c87058f4 #0 PREEMPT(full)\n    Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS\n    Google 02/12/2025\n    Workqueue: hci0 hci_devcd_timeout\n    Call Trace:\n     <TASK>\n     __dump_stack lib/dump_stack.c:94 [inline]\n     dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n     print_address_description mm/kasan/report.c:408 [inline]\n     print_report+0xc3/0x670 mm/kasan/report.c:521\n     kasan_report+0xe0/0x110 mm/kasan/report.c:634\n     check_region_inline mm/kasan/generic.c:183 [inline]\n     kasan_check_range+0xef/0x1a0 mm/kasan/generic.c:189\n     __asan_memcpy+0x23/0x60 mm/kasan/shadow.c:105\n     skb_put_data include/linux/skbuff.h:2752 [inline]\n     hci_devcd_dump+0x142/0x240 net/bluetooth/coredump.c:258\n     hci_devcd_timeout+0xb5/0x2e0 net/bluetooth/coredump.c:413\n     process_one_work+0x9cc/0x1b70 kernel/workqueue.c:3238\n     process_scheduled_works kernel/workqueue.c:3319 [inline]\n     worker_thread+0x6c8/0xf10 kernel/workqueue.c:3400\n     kthread+0x3c2/0x780 kernel/kthread.c:464\n     ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:153\n     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245\n     </TASK>\n\n    The buggy address ffffc90004ed5000 belongs to a vmalloc virtual mapping\n    Memory state around the buggy address:\n     ffffc90004ed4f00: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n     ffffc90004ed4f80: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n    >ffffc90004ed5000: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n                       ^\n     ffffc90004ed5080: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n     ffffc90004ed5100: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8\n    ==================================================================\n\nTo avoid this issue, reorder dev_coredumpv to be called after\nskb_put_data that does not free the data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38591",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/202900ceeef67458c964c2af6e1427c8e533ea7c",
          "name" : "https://git.kernel.org/stable/c/202900ceeef67458c964c2af6e1427c8e533ea7c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e09299225d5ba3916c91ef70565f7d2187e4cca0",
          "name" : "https://git.kernel.org/stable/c/e09299225d5ba3916c91ef70565f7d2187e4cca0",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject narrower access to pointer ctx fields\n\nThe following BPF program, simplified from a syzkaller repro, causes a\nkernel warning:\n\n    r0 = *(u8 *)(r1 + 169);\n    exit;\n\nWith pointer field sk being at offset 168 in __sk_buff. This access is\ndetected as a narrower read in bpf_skb_is_valid_access because it\ndoesn't match offsetof(struct __sk_buff, sk). It is therefore allowed\nand later proceeds to bpf_convert_ctx_access. Note that for the\n\"is_narrower_load\" case in the convert_ctx_accesses(), the insn->off\nis aligned, so the cnt may not be 0 because it matches the\noffsetof(struct __sk_buff, sk) in the bpf_convert_ctx_access. However,\nthe target_size stays 0 and the verifier errors with a kernel warning:\n\n    verifier bug: error during ctx access conversion(1)\n\nThis patch fixes that to return a proper \"invalid bpf_context access\noff=X size=Y\" error on the load instruction.\n\nThe same issue affects multiple other fields in context structures that\nallow narrow access. Some other non-affected fields (for sk_msg,\nsk_lookup, and sockopt) were also changed to use bpf_ctx_range_ptr for\nconsistency.\n\nNote this syzkaller crash was reported in the \"Closes\" link below, which\nused to be about a different bug, fixed in\ncommit fce7bd8e385a (\"bpf/verifier: Handle BPF_LOAD_ACQ instructions\nin insn_def_regno()\"). Because syzbot somehow confused the two bugs,\nthe new crash and repro didn't get reported to the mailing list."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38590",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/137b12a4900eb6971b889839eab6036f72cbb217",
          "name" : "https://git.kernel.org/stable/c/137b12a4900eb6971b889839eab6036f72cbb217",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/314f568b84b01f6eac1e4313ca47f9ade4349443",
          "name" : "https://git.kernel.org/stable/c/314f568b84b01f6eac1e4313ca47f9ade4349443",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3a5782431d84716b66302b07ff1b32fea1023bd5",
          "name" : "https://git.kernel.org/stable/c/3a5782431d84716b66302b07ff1b32fea1023bd5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6d19c44b5c6dd72f9a357d0399604ec16a77de3c",
          "name" : "https://git.kernel.org/stable/c/6d19c44b5c6dd72f9a357d0399604ec16a77de3c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/781a0bbf377443ef06f3248221f06cb555935530",
          "name" : "https://git.kernel.org/stable/c/781a0bbf377443ef06f3248221f06cb555935530",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/mlx5e: Remove skb secpath if xfrm state is not found\n\nHardware returns a unique identifier for a decrypted packet's xfrm\nstate, this state is looked up in an xarray. However, the state might\nhave been freed by the time of this lookup.\n\nCurrently, if the state is not found, only a counter is incremented.\nThe secpath (sp) extension on the skb is not removed, resulting in\nsp->len becoming 0.\n\nSubsequently, functions like __xfrm_policy_check() attempt to access\nfields such as xfrm_input_state(skb)->xso.type (which dereferences\nsp->xvec[sp->len - 1]) without first validating sp->len. This leads to\na crash when dereferencing an invalid state pointer.\n\nThis patch prevents the crash by explicitly removing the secpath\nextension from the skb if the xfrm state is not found after hardware\ndecryption. This ensures downstream functions do not operate on a\nzero-length secpath.\n\n BUG: unable to handle page fault for address: ffffffff000002c8\n #PF: supervisor read access in kernel mode\n #PF: error_code(0x0000) - not-present page\n PGD 282e067 P4D 282e067 PUD 0\n Oops: Oops: 0000 [#1] SMP\n CPU: 12 UID: 0 PID: 0 Comm: swapper/12 Not tainted 6.15.0-rc7_for_upstream_min_debug_2025_05_27_22_44 #1 NONE\n Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.13.0-0-gf21b5a4aeb02-prebuilt.qemu.org 04/01/2014\n RIP: 0010:__xfrm_policy_check+0x61a/0xa30\n Code: b6 77 7f 83 e6 02 74 14 4d 8b af d8 00 00 00 41 0f b6 45 05 c1 e0 03 48 98 49 01 c5 41 8b 45 00 83 e8 01 48 98 49 8b 44 c5 10 <0f> b6 80 c8 02 00 00 83 e0 0c 3c 04 0f 84 0c 02 00 00 31 ff 80 fa\n RSP: 0018:ffff88885fb04918 EFLAGS: 00010297\n RAX: ffffffff00000000 RBX: 0000000000000002 RCX: 0000000000000000\n RDX: 0000000000000002 RSI: 0000000000000002 RDI: 0000000000000000\n RBP: ffffffff8311af80 R08: 0000000000000020 R09: 00000000c2eda353\n R10: ffff88812be2bbc8 R11: 000000001faab533 R12: ffff88885fb049c8\n R13: ffff88812be2bbc8 R14: 0000000000000000 R15: ffff88811896ae00\n FS:  0000000000000000(0000) GS:ffff8888dca82000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: ffffffff000002c8 CR3: 0000000243050002 CR4: 0000000000372eb0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  <IRQ>\n  ? try_to_wake_up+0x108/0x4c0\n  ? udp4_lib_lookup2+0xbe/0x150\n  ? udp_lib_lport_inuse+0x100/0x100\n  ? __udp4_lib_lookup+0x2b0/0x410\n  __xfrm_policy_check2.constprop.0+0x11e/0x130\n  udp_queue_rcv_one_skb+0x1d/0x530\n  udp_unicast_rcv_skb+0x76/0x90\n  __udp4_lib_rcv+0xa64/0xe90\n  ip_protocol_deliver_rcu+0x20/0x130\n  ip_local_deliver_finish+0x75/0xa0\n  ip_local_deliver+0xc1/0xd0\n  ? ip_protocol_deliver_rcu+0x130/0x130\n  ip_sublist_rcv+0x1f9/0x240\n  ? ip_rcv_finish_core+0x430/0x430\n  ip_list_rcv+0xfc/0x130\n  __netif_receive_skb_list_core+0x181/0x1e0\n  netif_receive_skb_list_internal+0x200/0x360\n  ? mlx5e_build_rx_skb+0x1bc/0xda0 [mlx5_core]\n  gro_receive_skb+0xfd/0x210\n  mlx5e_handle_rx_cqe_mpwrq+0x141/0x280 [mlx5_core]\n  mlx5e_poll_rx_cq+0xcc/0x8e0 [mlx5_core]\n  ? mlx5e_handle_rx_dim+0x91/0xd0 [mlx5_core]\n  mlx5e_napi_poll+0x114/0xab0 [mlx5_core]\n  __napi_poll+0x25/0x170\n  net_rx_action+0x32d/0x3a0\n  ? mlx5_eq_comp_int+0x8d/0x280 [mlx5_core]\n  ? notifier_call_chain+0x33/0xa0\n  handle_softirqs+0xda/0x250\n  irq_exit_rcu+0x6d/0xc0\n  common_interrupt+0x81/0xa0\n  </IRQ>"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38589",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1bbb76a899486827394530916f01214d049931b3",
          "name" : "https://git.kernel.org/stable/c/1bbb76a899486827394530916f01214d049931b3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/47fbd7f8df19bdfbe334ee83f35568c9a29221ae",
          "name" : "https://git.kernel.org/stable/c/47fbd7f8df19bdfbe334ee83f35568c9a29221ae",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d9c4328795697ebc392a63fece3901999c09cddd",
          "name" : "https://git.kernel.org/stable/c/d9c4328795697ebc392a63fece3901999c09cddd",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nneighbour: Fix null-ptr-deref in neigh_flush_dev().\n\nkernel test robot reported null-ptr-deref in neigh_flush_dev(). [0]\n\nThe cited commit introduced per-netdev neighbour list and converted\nneigh_flush_dev() to use it instead of the global hash table.\n\nOne thing we missed is that neigh_table_clear() calls neigh_ifdown()\nwith NULL dev.\n\nLet's restore the hash table iteration.\n\nNote that IPv6 module is no longer unloadable, so neigh_table_clear()\nis called only when IPv6 fails to initialise, which is unlikely to\nhappen.\n\n[0]:\nIPv6: Attempt to unregister permanent protocol 136\nIPv6: Attempt to unregister permanent protocol 17\nOops: general protection fault, probably for non-canonical address 0xdffffc00000001a0: 0000 [#1] SMP KASAN\nKASAN: null-ptr-deref in range [0x0000000000000d00-0x0000000000000d07]\nCPU: 1 UID: 0 PID: 1 Comm: systemd Tainted: G                T  6.12.0-rc6-01246-gf7f52738637f #1\nTainted: [T]=RANDSTRUCT\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\nRIP: 0010:neigh_flush_dev.llvm.6395807810224103582+0x52/0x570\nCode: c1 e8 03 42 8a 04 38 84 c0 0f 85 15 05 00 00 31 c0 41 83 3e 0a 0f 94 c0 48 8d 1c c3 48 81 c3 f8 0c 00 00 48 89 d8 48 c1 e8 03 <42> 80 3c 38 00 74 08 48 89 df e8 f7 49 93 fe 4c 8b 3b 4d 85 ff 0f\nRSP: 0000:ffff88810026f408 EFLAGS: 00010206\nRAX: 00000000000001a0 RBX: 0000000000000d00 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffc0631640\nRBP: ffff88810026f470 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000000\nR13: ffffffffc0625250 R14: ffffffffc0631640 R15: dffffc0000000000\nFS:  00007f575cb83940(0000) GS:ffff8883aee00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f575db40008 CR3: 00000002bf936000 CR4: 00000000000406f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n <TASK>\n __neigh_ifdown.llvm.6395807810224103582+0x44/0x390\n neigh_table_clear+0xb1/0x268\n ndisc_cleanup+0x21/0x38 [ipv6]\n init_module+0x2f5/0x468 [ipv6]\n do_one_initcall+0x1ba/0x628\n do_init_module+0x21a/0x530\n load_module+0x2550/0x2ea0\n __se_sys_finit_module+0x3d2/0x620\n __x64_sys_finit_module+0x76/0x88\n x64_sys_call+0x7ff/0xde8\n do_syscall_64+0xfb/0x1e8\n entry_SYSCALL_64_after_hwframe+0x67/0x6f\nRIP: 0033:0x7f575d6f2719\nCode: 08 89 e8 5b 5d c3 66 2e 0f 1f 84 00 00 00 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d b7 06 0d 00 f7 d8 64 89 01 48\nRSP: 002b:00007fff82a2a268 EFLAGS: 00000246 ORIG_RAX: 0000000000000139\nRAX: ffffffffffffffda RBX: 0000557827b45310 RCX: 00007f575d6f2719\nRDX: 0000000000000000 RSI: 00007f575d584efd RDI: 0000000000000004\nRBP: 00007f575d584efd R08: 0000000000000000 R09: 0000557827b47b00\nR10: 0000000000000004 R11: 0000000000000246 R12: 0000000000020000\nR13: 0000000000000000 R14: 0000557827b470e0 R15: 00007f575dbb4270\n </TASK>\nModules linked in: ipv6(+)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38588",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3c13db3e47e170bab19e574404e7b6be45ea873d",
          "name" : "https://git.kernel.org/stable/c/3c13db3e47e170bab19e574404e7b6be45ea873d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/46aeb66e9e54ed0d56c18615e1c3dbd502b327ab",
          "name" : "https://git.kernel.org/stable/c/46aeb66e9e54ed0d56c18615e1c3dbd502b327ab",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/54e6fe9dd3b0e7c481c2228782c9494d653546da",
          "name" : "https://git.kernel.org/stable/c/54e6fe9dd3b0e7c481c2228782c9494d653546da",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6d345136c9b875f065d226908a29c25cdf9343f8",
          "name" : "https://git.kernel.org/stable/c/6d345136c9b875f065d226908a29c25cdf9343f8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cd8d8bbd9ced4cc5d06d858f67d4aa87745e8f38",
          "name" : "https://git.kernel.org/stable/c/cd8d8bbd9ced4cc5d06d858f67d4aa87745e8f38",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e1b7932af47f92432be8303d2439d1bf77b0be23",
          "name" : "https://git.kernel.org/stable/c/e1b7932af47f92432be8303d2439d1bf77b0be23",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: prevent infinite loop in rt6_nlmsg_size()\n\nWhile testing prior patch, I was able to trigger\nan infinite loop in rt6_nlmsg_size() in the following place:\n\nlist_for_each_entry_rcu(sibling, &f6i->fib6_siblings,\n\t\t\tfib6_siblings) {\n\trt6_nh_nlmsg_size(sibling->fib6_nh, &nexthop_len);\n}\n\nThis is because fib6_del_route() and fib6_add_rt2node()\nuses list_del_rcu(), which can confuse rcu readers,\nbecause they might no longer see the head of the list.\n\nRestart the loop if f6i->fib6_nsiblings is zero."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38587",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d",
          "name" : "https://git.kernel.org/stable/c/16d21816c0918f8058b5fc14cbe8595d62046e2d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0",
          "name" : "https://git.kernel.org/stable/c/9cb6de8ee144a94ae7a40bdb32560329ab7276f0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5",
          "name" : "https://git.kernel.org/stable/c/bc85e62394f008fa848c4ba02c936c735a3e8ef5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2",
          "name" : "https://git.kernel.org/stable/c/db65739d406c72776fbdbbc334be827ef05880d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211",
          "name" : "https://git.kernel.org/stable/c/e09be457b71b983a085312ff9e981f51e4ed3211",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073",
          "name" : "https://git.kernel.org/stable/c/f8d8ce1b515a0a6af72b30502670a406cfb75073",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: fix possible infinite loop in fib6_info_uses_dev()\n\nfib6_info_uses_dev() seems to rely on RCU without an explicit\nprotection.\n\nLike the prior fix in rt6_nlmsg_size(),\nwe need to make sure fib6_del_route() or fib6_add_rt2node()\nhave not removed the anchor from the list, or we risk an infinite loop."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38586",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0dbef493cae7d451f740558665893c000adb2321",
          "name" : "https://git.kernel.org/stable/c/0dbef493cae7d451f740558665893c000adb2321",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1ce30231e0a2c8c361ee5f8f7f265fc17130adce",
          "name" : "https://git.kernel.org/stable/c/1ce30231e0a2c8c361ee5f8f7f265fc17130adce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b114fcee766d5101eada1aca7bb5fd0a86c89b35",
          "name" : "https://git.kernel.org/stable/c/b114fcee766d5101eada1aca7bb5fd0a86c89b35",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e23184725dbb72d5d02940222eee36dbba2aa422",
          "name" : "https://git.kernel.org/stable/c/e23184725dbb72d5d02940222eee36dbba2aa422",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, arm64: Fix fp initialization for exception boundary\n\nIn the ARM64 BPF JIT when prog->aux->exception_boundary is set for a BPF\nprogram, find_used_callee_regs() is not called because for a program\nacting as exception boundary, all callee saved registers are saved.\nfind_used_callee_regs() sets `ctx->fp_used = true;` when it sees FP\nbeing used in any of the instructions.\n\nFor programs acting as exception boundary, ctx->fp_used remains false\neven if frame pointer is used by the program and therefore, FP is not\nset-up for such programs in the prologue. This can cause the kernel to\ncrash due to a pagefault.\n\nFix it by setting ctx->fp_used = true for exception boundary programs as\nfp is always saved in such programs."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38585",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1a7a2f59fb2eb0718a0cff1e5822500cefe50ed9",
          "name" : "https://git.kernel.org/stable/c/1a7a2f59fb2eb0718a0cff1e5822500cefe50ed9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3d672fe065aa00f4d66f42e3c9720f69a3ed43e7",
          "name" : "https://git.kernel.org/stable/c/3d672fe065aa00f4d66f42e3c9720f69a3ed43e7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e6d3453a002e89537e6136f6c774659b297a549b",
          "name" : "https://git.kernel.org/stable/c/e6d3453a002e89537e6136f6c774659b297a549b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ee4cf798202d285dcbe85e4467a094c44f5ed8e6",
          "name" : "https://git.kernel.org/stable/c/ee4cf798202d285dcbe85e4467a094c44f5ed8e6",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nstaging: media: atomisp: Fix stack buffer overflow in gmin_get_var_int()\n\nWhen gmin_get_config_var() calls efi.get_variable() and the EFI variable\nis larger than the expected buffer size, two behaviors combine to create\na stack buffer overflow:\n\n1. gmin_get_config_var() does not return the proper error code when\n   efi.get_variable() fails. It returns the stale 'ret' value from\n   earlier operations instead of indicating the EFI failure.\n\n2. When efi.get_variable() returns EFI_BUFFER_TOO_SMALL, it updates\n   *out_len to the required buffer size but writes no data to the output\n   buffer. However, due to bug #1, gmin_get_var_int() believes the call\n   succeeded.\n\nThe caller gmin_get_var_int() then performs:\n- Allocates val[CFG_VAR_NAME_MAX + 1] (65 bytes) on stack\n- Calls gmin_get_config_var(dev, is_gmin, var, val, &len) with len=64\n- If EFI variable is >64 bytes, efi.get_variable() sets len=required_size\n- Due to bug #1, thinks call succeeded with len=required_size\n- Executes val[len] = 0, writing past end of 65-byte stack buffer\n\nThis creates a stack buffer overflow when EFI variables are larger than\n64 bytes. Since EFI variables can be controlled by firmware or system\nconfiguration, this could potentially be exploited for code execution.\n\nFix the bug by returning proper error codes from gmin_get_config_var()\nbased on EFI status instead of stale 'ret' value.\n\nThe gmin_get_var_int() function is called during device initialization\nfor camera sensor configuration on Intel Bay Trail and Cherry Trail\nplatforms using the atomisp camera stack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38584",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91",
          "name" : "https://git.kernel.org/stable/c/71203f68c7749609d7fc8ae6ad054bdedeb24f91",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52",
          "name" : "https://git.kernel.org/stable/c/cdf79bd2e1ecb3cc75631c73d8f4149be6019a52",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa",
          "name" : "https://git.kernel.org/stable/c/dbe3e911a59bda6de96e7cae387ff882c2c177fa",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\npadata: Fix pd UAF once and for all\n\nThere is a race condition/UAF in padata_reorder that goes back\nto the initial commit.  A reference count is taken at the start\nof the process in padata_do_parallel, and released at the end in\npadata_serial_worker.\n\nThis reference count is (and only is) required for padata_replace\nto function correctly.  If padata_replace is never called then\nthere is no issue.\n\nIn the function padata_reorder which serves as the core of padata,\nas soon as padata is added to queue->serial.list, and the associated\nspin lock released, that padata may be processed and the reference\ncount on pd would go away.\n\nFix this by getting the next padata before the squeue->serial lock\nis released.\n\nIn order to make this possible, simplify padata_reorder by only\ncalling it once the next padata arrives."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38583",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d",
          "name" : "https://git.kernel.org/stable/c/3b0abc443ac22f7d4f61ddbbbbc5dbb06c87139d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/51990eecf22f446550befdfd1a9f54147eafd636",
          "name" : "https://git.kernel.org/stable/c/51990eecf22f446550befdfd1a9f54147eafd636",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/86124c5cfceb5ac04d2fddbf1b6f7147332d96a3",
          "name" : "https://git.kernel.org/stable/c/86124c5cfceb5ac04d2fddbf1b6f7147332d96a3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/88bd875b7f9c3652c27d6e4bb7a23701b764f762",
          "name" : "https://git.kernel.org/stable/c/88bd875b7f9c3652c27d6e4bb7a23701b764f762",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed",
          "name" : "https://git.kernel.org/stable/c/a72b1c2d3b53e088bfaeb593949ff6fbd2cbe8ed",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f1a1be99d5ae53d3b404415f1665eb59e8e02a8c",
          "name" : "https://git.kernel.org/stable/c/f1a1be99d5ae53d3b404415f1665eb59e8e02a8c",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nclk: xilinx: vcu: unregister pll_post only if registered correctly\n\nIf registration of pll_post is failed, it will be set to NULL or ERR,\nunregistering same will fail with following call trace:\n\nUnable to handle kernel NULL pointer dereference at virtual address 008\npc : clk_hw_unregister+0xc/0x20\nlr : clk_hw_unregister_fixed_factor+0x18/0x30\nsp : ffff800011923850\n...\nCall trace:\n clk_hw_unregister+0xc/0x20\n clk_hw_unregister_fixed_factor+0x18/0x30\n xvcu_unregister_clock_provider+0xcc/0xf4 [xlnx_vcu]\n xvcu_probe+0x2bc/0x53c [xlnx_vcu]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38582",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/10b083dbba22be19baa848432b6f25aa68ab2db5",
          "name" : "https://git.kernel.org/stable/c/10b083dbba22be19baa848432b6f25aa68ab2db5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c6957b95ecc5b63c5a4bb4ecc28af326cf8f6dc8",
          "name" : "https://git.kernel.org/stable/c/c6957b95ecc5b63c5a4bb4ecc28af326cf8f6dc8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/dab173bae3303f074f063750a8dead2550d8c782",
          "name" : "https://git.kernel.org/stable/c/dab173bae3303f074f063750a8dead2550d8c782",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fc8b0f5b16bab2e032b4cfcd6218d5df3b80b2ea",
          "name" : "https://git.kernel.org/stable/c/fc8b0f5b16bab2e032b4cfcd6218d5df3b80b2ea",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hns: Fix double destruction of rsv_qp\n\nrsv_qp may be double destroyed in error flow, first in free_mr_init(),\nand then in hns_roce_exit(). Fix it by moving the free_mr_init() call\ninto hns_roce_v2_init().\n\nlist_del corruption, ffff589732eb9b50->next is LIST_POISON1 (dead000000000100)\nWARNING: CPU: 8 PID: 1047115 at lib/list_debug.c:53 __list_del_entry_valid+0x148/0x240\n...\nCall trace:\n __list_del_entry_valid+0x148/0x240\n hns_roce_qp_remove+0x4c/0x3f0 [hns_roce_hw_v2]\n hns_roce_v2_destroy_qp_common+0x1dc/0x5f4 [hns_roce_hw_v2]\n hns_roce_v2_destroy_qp+0x22c/0x46c [hns_roce_hw_v2]\n free_mr_exit+0x6c/0x120 [hns_roce_hw_v2]\n hns_roce_v2_exit+0x170/0x200 [hns_roce_hw_v2]\n hns_roce_exit+0x118/0x350 [hns_roce_hw_v2]\n __hns_roce_hw_v2_init_instance+0x1c8/0x304 [hns_roce_hw_v2]\n hns_roce_hw_v2_reset_notify_init+0x170/0x21c [hns_roce_hw_v2]\n hns_roce_hw_v2_reset_notify+0x6c/0x190 [hns_roce_hw_v2]\n hclge_notify_roce_client+0x6c/0x160 [hclge]\n hclge_reset_rebuild+0x150/0x5c0 [hclge]\n hclge_reset+0x10c/0x140 [hclge]\n hclge_reset_subtask+0x80/0x104 [hclge]\n hclge_reset_service_task+0x168/0x3ac [hclge]\n hclge_service_task+0x50/0x100 [hclge]\n process_one_work+0x250/0x9a0\n worker_thread+0x324/0x990\n kthread+0x190/0x210\n ret_from_fork+0x10/0x18"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38581",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/181698af38d3f93381229ad89c09b5bd0496661a",
          "name" : "https://git.kernel.org/stable/c/181698af38d3f93381229ad89c09b5bd0496661a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2d4060f05e74dbee884ba723f6afd9282befc3c5",
          "name" : "https://git.kernel.org/stable/c/2d4060f05e74dbee884ba723f6afd9282befc3c5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/64ec9a7e7a6398b172ab6feba60e952163a1c3d5",
          "name" : "https://git.kernel.org/stable/c/64ec9a7e7a6398b172ab6feba60e952163a1c3d5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6eadf50c1d894cb34f3237064063207460946040",
          "name" : "https://git.kernel.org/stable/c/6eadf50c1d894cb34f3237064063207460946040",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9dea08eac4f6d6fbbae59992978252e2edab995d",
          "name" : "https://git.kernel.org/stable/c/9dea08eac4f6d6fbbae59992978252e2edab995d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/db111468531777cac8b4beb6515a88a54b0c4a74",
          "name" : "https://git.kernel.org/stable/c/db111468531777cac8b4beb6515a88a54b0c4a74",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: ccp - Fix crash when rebind ccp device for ccp.ko\n\nWhen CONFIG_CRYPTO_DEV_CCP_DEBUGFS is enabled, rebinding\nthe ccp device causes the following crash:\n\n$ echo '0000:0a:00.2' > /sys/bus/pci/drivers/ccp/unbind\n$ echo '0000:0a:00.2' > /sys/bus/pci/drivers/ccp/bind\n\n[  204.976930] BUG: kernel NULL pointer dereference, address: 0000000000000098\n[  204.978026] #PF: supervisor write access in kernel mode\n[  204.979126] #PF: error_code(0x0002) - not-present page\n[  204.980226] PGD 0 P4D 0\n[  204.981317] Oops: Oops: 0002 [#1] SMP NOPTI\n...\n[  204.997852] Call Trace:\n[  204.999074]  <TASK>\n[  205.000297]  start_creating+0x9f/0x1c0\n[  205.001533]  debugfs_create_dir+0x1f/0x170\n[  205.002769]  ? srso_return_thunk+0x5/0x5f\n[  205.004000]  ccp5_debugfs_setup+0x87/0x170 [ccp]\n[  205.005241]  ccp5_init+0x8b2/0x960 [ccp]\n[  205.006469]  ccp_dev_init+0xd4/0x150 [ccp]\n[  205.007709]  sp_init+0x5f/0x80 [ccp]\n[  205.008942]  sp_pci_probe+0x283/0x2e0 [ccp]\n[  205.010165]  ? srso_return_thunk+0x5/0x5f\n[  205.011376]  local_pci_probe+0x4f/0xb0\n[  205.012584]  pci_device_probe+0xdb/0x230\n[  205.013810]  really_probe+0xed/0x380\n[  205.015024]  __driver_probe_device+0x7e/0x160\n[  205.016240]  device_driver_attach+0x2f/0x60\n[  205.017457]  bind_store+0x7c/0xb0\n[  205.018663]  drv_attr_store+0x28/0x40\n[  205.019868]  sysfs_kf_write+0x5f/0x70\n[  205.021065]  kernfs_fop_write_iter+0x145/0x1d0\n[  205.022267]  vfs_write+0x308/0x440\n[  205.023453]  ksys_write+0x6d/0xe0\n[  205.024616]  __x64_sys_write+0x1e/0x30\n[  205.025778]  x64_sys_call+0x16ba/0x2150\n[  205.026942]  do_syscall_64+0x56/0x1e0\n[  205.028108]  entry_SYSCALL_64_after_hwframe+0x76/0x7e\n[  205.029276] RIP: 0033:0x7fbc36f10104\n[  205.030420] Code: 89 02 48 c7 c0 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 8d 05 e1 08 2e 00 8b 00 85 c0 75 13 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 54 f3 c3 66 90 41 54 55 49 89 d4 53 48 89 f5\n\nThis patch sets ccp_debugfs_dir to NULL after destroying it in\nccp5_debugfs_destroy, allowing the directory dentry to be\nrecreated when rebinding the ccp device.\n\nTested on AMD Ryzen 7 1700X."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38580",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/469c44e66e2110054949609dde095788320139d0",
          "name" : "https://git.kernel.org/stable/c/469c44e66e2110054949609dde095788320139d0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ac999862b98a0f49e858e509f776be51406f1e77",
          "name" : "https://git.kernel.org/stable/c/ac999862b98a0f49e858e509f776be51406f1e77",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c678bdc998754589cea2e6afab9401d7d8312ac4",
          "name" : "https://git.kernel.org/stable/c/c678bdc998754589cea2e6afab9401d7d8312ac4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix inode use after free in ext4_end_io_rsv_work()\n\nIn ext4_io_end_defer_completion(), check if io_end->list_vec is empty to\navoid adding an io_end that requires no conversion to the\ni_rsv_conversion_list, which in turn prevents starting an unnecessary\nworker. An ext4_emergency_state() check is also added to avoid attempting\nto abort the journal in an emergency state.\n\nAdditionally, ext4_put_io_end_defer() is refactored to call\next4_io_end_defer_completion() directly instead of being open-coded.\nThis also prevents starting an unnecessary worker when EXT4_IO_END_FAILED\nis set but data_err=abort is not enabled.\n\nThis ensures that the check in ext4_put_io_end_defer() is consistent with\nthe check in ext4_end_bio(). Otherwise, we might add an io_end to the\ni_rsv_conversion_list and then call ext4_finish_bio(), after which the\ninode could be freed before ext4_end_io_rsv_work() is called, triggering\na use-after-free issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38579",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/01b6f5955e0008af6bc3a181310d2744bb349800",
          "name" : "https://git.kernel.org/stable/c/01b6f5955e0008af6bc3a181310d2744bb349800",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/154467f4ad033473e5c903a03e7b9bca7df9a0fa",
          "name" : "https://git.kernel.org/stable/c/154467f4ad033473e5c903a03e7b9bca7df9a0fa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/44a79437309e0ee2276ac17aaedc71253af253a8",
          "name" : "https://git.kernel.org/stable/c/44a79437309e0ee2276ac17aaedc71253af253a8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cc1615d5aba4f396cf412579928539a2b124c8a0",
          "name" : "https://git.kernel.org/stable/c/cc1615d5aba4f396cf412579928539a2b124c8a0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/dabfa3952c8e6bfe6414dbf32e8b6c5f349dc898",
          "name" : "https://git.kernel.org/stable/c/dabfa3952c8e6bfe6414dbf32e8b6c5f349dc898",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e68b751ec2b15d866967812c57cfdfc1eba6a269",
          "name" : "https://git.kernel.org/stable/c/e68b751ec2b15d866967812c57cfdfc1eba6a269",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix KMSAN uninit-value in extent_info usage\n\nKMSAN reported a use of uninitialized value in `__is_extent_mergeable()`\n and `__is_back_mergeable()` via the read extent tree path.\n\nThe root cause is that `get_read_extent_info()` only initializes three\nfields (`fofs`, `blk`, `len`) of `struct extent_info`, leaving the\nremaining fields uninitialized. This leads to undefined behavior\nwhen those fields are accessed later, especially during\nextent merging.\n\nFix it by zero-initializing the `extent_info` struct before population."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38578",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3d37cadaac1a8e108e576297aab9125b24ea2dfe",
          "name" : "https://git.kernel.org/stable/c/3d37cadaac1a8e108e576297aab9125b24ea2dfe",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6cac47af39b2b8edbb41d47c3bd9c332f83e9932",
          "name" : "https://git.kernel.org/stable/c/6cac47af39b2b8edbb41d47c3bd9c332f83e9932",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7c30d79930132466f5be7d0b57add14d1a016bda",
          "name" : "https://git.kernel.org/stable/c/7c30d79930132466f5be7d0b57add14d1a016bda",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/917ae5e280bc263f56c83fba0d0f0be2c4828083",
          "name" : "https://git.kernel.org/stable/c/917ae5e280bc263f56c83fba0d0f0be2c4828083",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a4b0cc9e0bba7525a29f37714e88df12a47997a2",
          "name" : "https://git.kernel.org/stable/c/a4b0cc9e0bba7525a29f37714e88df12a47997a2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/dea243f58a8391e76f42ad5eb59ff210519ee772",
          "name" : "https://git.kernel.org/stable/c/dea243f58a8391e76f42ad5eb59ff210519ee772",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid UAF in f2fs_sync_inode_meta()\n\nsyzbot reported an UAF issue as below: [1] [2]\n\n[1] https://syzkaller.appspot.com/text?tag=CrashReport&x=16594c60580000\n\n==================================================================\nBUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62\nRead of size 8 at addr ffff888100567dc8 by task kworker/u4:0/8\n\nCPU: 1 PID: 8 Comm: kworker/u4:0 Tainted: G        W          6.1.129-syzkaller-00017-g642656a36791 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nWorkqueue: writeback wb_workfn (flush-7:0)\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:88 [inline]\n dump_stack_lvl+0x151/0x1b7 lib/dump_stack.c:106\n print_address_description mm/kasan/report.c:316 [inline]\n print_report+0x158/0x4e0 mm/kasan/report.c:427\n kasan_report+0x13c/0x170 mm/kasan/report.c:531\n __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351\n __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62\n __list_del_entry include/linux/list.h:134 [inline]\n list_del_init include/linux/list.h:206 [inline]\n f2fs_inode_synced+0x100/0x2e0 fs/f2fs/super.c:1553\n f2fs_update_inode+0x72/0x1c40 fs/f2fs/inode.c:588\n f2fs_update_inode_page+0x135/0x170 fs/f2fs/inode.c:706\n f2fs_write_inode+0x416/0x790 fs/f2fs/inode.c:734\n write_inode fs/fs-writeback.c:1460 [inline]\n __writeback_single_inode+0x4cf/0xb80 fs/fs-writeback.c:1677\n writeback_sb_inodes+0xb32/0x1910 fs/fs-writeback.c:1903\n __writeback_inodes_wb+0x118/0x3f0 fs/fs-writeback.c:1974\n wb_writeback+0x3da/0xa00 fs/fs-writeback.c:2081\n wb_check_background_flush fs/fs-writeback.c:2151 [inline]\n wb_do_writeback fs/fs-writeback.c:2239 [inline]\n wb_workfn+0xbba/0x1030 fs/fs-writeback.c:2266\n process_one_work+0x73d/0xcb0 kernel/workqueue.c:2299\n worker_thread+0xa60/0x1260 kernel/workqueue.c:2446\n kthread+0x26d/0x300 kernel/kthread.c:386\n ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:295\n </TASK>\n\nAllocated by task 298:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x4b/0x70 mm/kasan/common.c:52\n kasan_save_alloc_info+0x1f/0x30 mm/kasan/generic.c:505\n __kasan_slab_alloc+0x6c/0x80 mm/kasan/common.c:333\n kasan_slab_alloc include/linux/kasan.h:202 [inline]\n slab_post_alloc_hook+0x53/0x2c0 mm/slab.h:768\n slab_alloc_node mm/slub.c:3421 [inline]\n slab_alloc mm/slub.c:3431 [inline]\n __kmem_cache_alloc_lru mm/slub.c:3438 [inline]\n kmem_cache_alloc_lru+0x102/0x270 mm/slub.c:3454\n alloc_inode_sb include/linux/fs.h:3255 [inline]\n f2fs_alloc_inode+0x2d/0x350 fs/f2fs/super.c:1437\n alloc_inode fs/inode.c:261 [inline]\n iget_locked+0x18c/0x7e0 fs/inode.c:1373\n f2fs_iget+0x55/0x4ca0 fs/f2fs/inode.c:486\n f2fs_lookup+0x3c1/0xb50 fs/f2fs/namei.c:484\n __lookup_slow+0x2b9/0x3e0 fs/namei.c:1689\n lookup_slow+0x5a/0x80 fs/namei.c:1706\n walk_component+0x2e7/0x410 fs/namei.c:1997\n lookup_last fs/namei.c:2454 [inline]\n path_lookupat+0x16d/0x450 fs/namei.c:2478\n filename_lookup+0x251/0x600 fs/namei.c:2507\n vfs_statx+0x107/0x4b0 fs/stat.c:229\n vfs_fstatat fs/stat.c:267 [inline]\n vfs_lstat include/linux/fs.h:3434 [inline]\n __do_sys_newlstat fs/stat.c:423 [inline]\n __se_sys_newlstat+0xda/0x7c0 fs/stat.c:417\n __x64_sys_newlstat+0x5b/0x70 fs/stat.c:417\n x64_sys_call+0x52/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:7\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x3b/0x80 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x68/0xd2\n\nFreed by task 0:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x4b/0x70 mm/kasan/common.c:52\n kasan_save_free_info+0x2b/0x40 mm/kasan/generic.c:516\n ____kasan_slab_free+0x131/0x180 mm/kasan/common.c:241\n __kasan_slab_free+0x11/0x20 mm/kasan/common.c:249\n kasan_slab_free include/linux/kasan.h:178 [inline]\n slab_free_hook mm/slub.c:1745 [inline]\n slab_free_freelist_hook mm/slub.c:1771 [inline]\n slab_free mm/slub.c:3686 [inline]\n kmem_cache_free+0x\n---truncated---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38577",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/42f9ea16aea8b49febaa87950a006a1792209f38",
          "name" : "https://git.kernel.org/stable/c/42f9ea16aea8b49febaa87950a006a1792209f38",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4732ca17c17f5062426cfa982f43593e6b81963b",
          "name" : "https://git.kernel.org/stable/c/4732ca17c17f5062426cfa982f43593e6b81963b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5",
          "name" : "https://git.kernel.org/stable/c/880ef748e78a1eb7df2d8e11a9ef21e98bcaabe5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/97df495d754116c8c28ac6a4112f831727bde887",
          "name" : "https://git.kernel.org/stable/c/97df495d754116c8c28ac6a4112f831727bde887",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9bbfe83924946552c4c513099c0e8c83af76311a",
          "name" : "https://git.kernel.org/stable/c/9bbfe83924946552c4c513099c0e8c83af76311a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a509a55f8eecc8970b3980c6f06886bbff0e2f68",
          "name" : "https://git.kernel.org/stable/c/a509a55f8eecc8970b3980c6f06886bbff0e2f68",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nf2fs: fix to avoid panic in f2fs_evict_inode\n\nAs syzbot [1] reported as below:\n\nR10: 0000000000000100 R11: 0000000000000206 R12: 00007ffe17473450\nR13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520\n </TASK>\n---[ end trace 0000000000000000 ]---\n==================================================================\nBUG: KASAN: use-after-free in __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62\nRead of size 8 at addr ffff88812d962278 by task syz-executor/564\n\nCPU: 1 PID: 564 Comm: syz-executor Tainted: G        W          6.1.129-syzkaller #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025\nCall Trace:\n <TASK>\n __dump_stack+0x21/0x24 lib/dump_stack.c:88\n dump_stack_lvl+0xee/0x158 lib/dump_stack.c:106\n print_address_description+0x71/0x210 mm/kasan/report.c:316\n print_report+0x4a/0x60 mm/kasan/report.c:427\n kasan_report+0x122/0x150 mm/kasan/report.c:531\n __asan_report_load8_noabort+0x14/0x20 mm/kasan/report_generic.c:351\n __list_del_entry_valid+0xa6/0x130 lib/list_debug.c:62\n __list_del_entry include/linux/list.h:134 [inline]\n list_del_init include/linux/list.h:206 [inline]\n f2fs_inode_synced+0xf7/0x2e0 fs/f2fs/super.c:1531\n f2fs_update_inode+0x74/0x1c40 fs/f2fs/inode.c:585\n f2fs_update_inode_page+0x137/0x170 fs/f2fs/inode.c:703\n f2fs_write_inode+0x4ec/0x770 fs/f2fs/inode.c:731\n write_inode fs/fs-writeback.c:1460 [inline]\n __writeback_single_inode+0x4a0/0xab0 fs/fs-writeback.c:1677\n writeback_single_inode+0x221/0x8b0 fs/fs-writeback.c:1733\n sync_inode_metadata+0xb6/0x110 fs/fs-writeback.c:2789\n f2fs_sync_inode_meta+0x16d/0x2a0 fs/f2fs/checkpoint.c:1159\n block_operations fs/f2fs/checkpoint.c:1269 [inline]\n f2fs_write_checkpoint+0xca3/0x2100 fs/f2fs/checkpoint.c:1658\n kill_f2fs_super+0x231/0x390 fs/f2fs/super.c:4668\n deactivate_locked_super+0x98/0x100 fs/super.c:332\n deactivate_super+0xaf/0xe0 fs/super.c:363\n cleanup_mnt+0x45f/0x4e0 fs/namespace.c:1186\n __cleanup_mnt+0x19/0x20 fs/namespace.c:1193\n task_work_run+0x1c6/0x230 kernel/task_work.c:203\n exit_task_work include/linux/task_work.h:39 [inline]\n do_exit+0x9fb/0x2410 kernel/exit.c:871\n do_group_exit+0x210/0x2d0 kernel/exit.c:1021\n __do_sys_exit_group kernel/exit.c:1032 [inline]\n __se_sys_exit_group kernel/exit.c:1030 [inline]\n __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1030\n x64_sys_call+0x7b4/0x9a0 arch/x86/include/generated/asm/syscalls_64.h:232\n do_syscall_x64 arch/x86/entry/common.c:51 [inline]\n do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:81\n entry_SYSCALL_64_after_hwframe+0x68/0xd2\nRIP: 0033:0x7f28b1b8e169\nCode: Unable to access opcode bytes at 0x7f28b1b8e13f.\nRSP: 002b:00007ffe174710a8 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 00007f28b1c10879 RCX: 00007f28b1b8e169\nRDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000001\nRBP: 0000000000000002 R08: 00007ffe1746ee47 R09: 00007ffe17472360\nR10: 0000000000000009 R11: 0000000000000246 R12: 00007ffe17472360\nR13: 00007f28b1c10854 R14: 000000000000dae5 R15: 00007ffe17474520\n </TASK>\n\nAllocated by task 569:\n kasan_save_stack mm/kasan/common.c:45 [inline]\n kasan_set_track+0x4b/0x70 mm/kasan/common.c:52\n kasan_save_alloc_info+0x25/0x30 mm/kasan/generic.c:505\n __kasan_slab_alloc+0x72/0x80 mm/kasan/common.c:328\n kasan_slab_alloc include/linux/kasan.h:201 [inline]\n slab_post_alloc_hook+0x4f/0x2c0 mm/slab.h:737\n slab_alloc_node mm/slub.c:3398 [inline]\n slab_alloc mm/slub.c:3406 [inline]\n __kmem_cache_alloc_lru mm/slub.c:3413 [inline]\n kmem_cache_alloc_lru+0x104/0x220 mm/slub.c:3429\n alloc_inode_sb include/linux/fs.h:3245 [inline]\n f2fs_alloc_inode+0x2d/0x340 fs/f2fs/super.c:1419\n alloc_inode fs/inode.c:261 [inline]\n iget_locked+0x186/0x880 fs/inode.c:1373\n f2fs_iget+0x55/0x4c60 fs/f2fs/inode.c:483\n f2fs_lookup+0x366/0xab0 fs/f2fs/namei.c:487\n __lookup_slow+0x2a3/0x3d0 fs/namei.c:1690\n lookup_slow+0x57/0x70 fs/namei.c:1707\n walk_component+0x2e6/0x410 fs/namei\n---truncated---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38576",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7",
          "name" : "https://git.kernel.org/stable/c/1010b4c012b0d78dfb9d3132b49aa2ef024a07a7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/19d5036e7ad766cf212aebec23b9f1d7924a62bc",
          "name" : "https://git.kernel.org/stable/c/19d5036e7ad766cf212aebec23b9f1d7924a62bc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/59c6d3d81d42bf543c90597b4f38c53d6874c5a1",
          "name" : "https://git.kernel.org/stable/c/59c6d3d81d42bf543c90597b4f38c53d6874c5a1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a426e8a6ae161f51888585b065db0f8f93ab2e16",
          "name" : "https://git.kernel.org/stable/c/a426e8a6ae161f51888585b065db0f8f93ab2e16",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d2c60a8a387e9fcc28447ef36c03f8e49fd052a6",
          "name" : "https://git.kernel.org/stable/c/d2c60a8a387e9fcc28447ef36c03f8e49fd052a6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d42bbd8f30ac38b1ce54715bf08ec3dac18d6b25",
          "name" : "https://git.kernel.org/stable/c/d42bbd8f30ac38b1ce54715bf08ec3dac18d6b25",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/eeh: Make EEH driver device hotplug safe\n\nMultiple race conditions existed between the PCIe hotplug driver and the\nEEH driver, leading to a variety of kernel oopses of the same general\nnature:\n\n<pcie device unplug>\n<eeh driver trigger>\n<hotplug removal trigger>\n<pcie tree reconfiguration>\n<eeh recovery next step>\n<oops in EEH driver bus iteration loop>\n\nA second class of oops is also seen when the underlying bus disappears\nduring device recovery.\n\nRefactor the EEH module to be PCI rescan and remove safe.  Also clean\nup a few minor formatting / readability issues."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38574",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c",
          "name" : "https://git.kernel.org/stable/c/1a04db0fd75cb6034fc27a56b67b3b8b9022a98c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611",
          "name" : "https://git.kernel.org/stable/c/5005d24377378a20e5c0e53052fc4ebdcdcbc611",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193",
          "name" : "https://git.kernel.org/stable/c/504cc4ab91073d2ac7404ad146139f86ecee7193",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb",
          "name" : "https://git.kernel.org/stable/c/b7dcda76fd0615c0599c89f36873a6cd48e02dbb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b",
          "name" : "https://git.kernel.org/stable/c/de9c4861fb42f0cd72da844c3c34f692d5895b7b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba",
          "name" : "https://git.kernel.org/stable/c/ea99b88b1999ebcb24d5d3a6b7910030f40d3bba",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\npptp: ensure minimal skb length in pptp_xmit()\n\nCommit aabc6596ffb3 (\"net: ppp: Add bound checking for skb data\non ppp_sync_txmung\") fixed ppp_sync_txmunge()\n\nWe need a similar fix in pptp_xmit(), otherwise we might\nread uninit data as reported by syzbot.\n\nBUG: KMSAN: uninit-value in pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  pptp_xmit+0xc34/0x2720 drivers/net/ppp/pptp.c:193\n  ppp_channel_bridge_input drivers/net/ppp/ppp_generic.c:2290 [inline]\n  ppp_input+0x1d6/0xe60 drivers/net/ppp/ppp_generic.c:2314\n  pppoe_rcv_core+0x1e8/0x760 drivers/net/ppp/pppoe.c:379\n  sk_backlog_rcv+0x142/0x420 include/net/sock.h:1148\n  __release_sock+0x1d3/0x330 net/core/sock.c:3213\n  release_sock+0x6b/0x270 net/core/sock.c:3767\n  pppoe_sendmsg+0x15d/0xcb0 drivers/net/ppp/pppoe.c:904\n  sock_sendmsg_nosec net/socket.c:712 [inline]\n  __sock_sendmsg+0x330/0x3d0 net/socket.c:727\n  ____sys_sendmsg+0x893/0xd80 net/socket.c:2566\n  ___sys_sendmsg+0x271/0x3b0 net/socket.c:2620\n  __sys_sendmmsg+0x2d9/0x7c0 net/socket.c:2709"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38573",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/139b5df757a0aa436f763b0038e0b73808d2f4b6",
          "name" : "https://git.kernel.org/stable/c/139b5df757a0aa436f763b0038e0b73808d2f4b6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/674328102baad76c7a06628efc01974ece5ae27f",
          "name" : "https://git.kernel.org/stable/c/674328102baad76c7a06628efc01974ece5ae27f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9f0035ae38d2571f5ddedc829d74492013caa625",
          "name" : "https://git.kernel.org/stable/c/9f0035ae38d2571f5ddedc829d74492013caa625",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667",
          "name" : "https://git.kernel.org/stable/c/ffcfd071eec7973e58c4ffff7da4cb0e9ca7b667",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nspi: cs42l43: Property entry should be a null-terminated array\n\nThe software node does not specify a count of property entries, so the\narray must be null-terminated.\n\nWhen unterminated, this can lead to a fault in the downstream cs35l56\namplifier driver, because the node parse walks off the end of the\narray into unknown memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38572",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67",
          "name" : "https://git.kernel.org/stable/c/5489e7fc6f8be3062f8cb7e49406de4bfd94db67",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e",
          "name" : "https://git.kernel.org/stable/c/573b8250fc2554761db3bc2bbdbab23789d52d4e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe",
          "name" : "https://git.kernel.org/stable/c/d45cf1e7d7180256e17c9ce88e32e8061a7887fe",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e",
          "name" : "https://git.kernel.org/stable/c/de322cdf600fc9433845a9e944d1ca6b31cfb67e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789",
          "name" : "https://git.kernel.org/stable/c/ee851768e4b8371ce151fd446d24bf3ae2d18789",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20",
          "name" : "https://git.kernel.org/stable/c/ef05007b403dcc21e701cb1f30d4572ac0a9da20",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: reject malicious packets in ipv6_gso_segment()\n\nsyzbot was able to craft a packet with very long IPv6 extension headers\nleading to an overflow of skb->transport_header.\n\nThis 16bit field has a limited range.\n\nAdd skb_reset_transport_header_careful() helper and use it\nfrom ipv6_gso_segment()\n\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\nWARNING: CPU: 0 PID: 5871 at ./include/linux/skbuff.h:3032 ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nModules linked in:\nCPU: 0 UID: 0 PID: 5871 Comm: syz-executor211 Not tainted 6.16.0-rc6-syzkaller-g7abc678e3084 #0 PREEMPT(full)\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025\n RIP: 0010:skb_reset_transport_header include/linux/skbuff.h:3032 [inline]\n RIP: 0010:ipv6_gso_segment+0x15e2/0x21e0 net/ipv6/ip6_offload.c:151\nCall Trace:\n <TASK>\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  nsh_gso_segment+0x54a/0xe10 net/nsh/nsh.c:110\n  skb_mac_gso_segment+0x31c/0x640 net/core/gso.c:53\n  __skb_gso_segment+0x342/0x510 net/core/gso.c:124\n  skb_gso_segment include/net/gso.h:83 [inline]\n  validate_xmit_skb+0x857/0x11b0 net/core/dev.c:3950\n  validate_xmit_skb_list+0x84/0x120 net/core/dev.c:4000\n  sch_direct_xmit+0xd3/0x4b0 net/sched/sch_generic.c:329\n  __dev_xmit_skb net/core/dev.c:4102 [inline]\n  __dev_queue_xmit+0x17b6/0x3a70 net/core/dev.c:4679"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38571",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3ee397eaaca4fa04db21bb98c8f1d0c6cc525368",
          "name" : "https://git.kernel.org/stable/c/3ee397eaaca4fa04db21bb98c8f1d0c6cc525368",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3feada5baf4dc96e151ff2ca54630e1d274e5458",
          "name" : "https://git.kernel.org/stable/c/3feada5baf4dc96e151ff2ca54630e1d274e5458",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95",
          "name" : "https://git.kernel.org/stable/c/a55b3d15331859d9fdd261cfa6d34ca2aeb0fb95",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c36b2fbd60e8f9c6f975522130998608880c93be",
          "name" : "https://git.kernel.org/stable/c/c36b2fbd60e8f9c6f975522130998608880c93be",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cc5d59081fa26506d02de2127ab822f40d88bc5a",
          "name" : "https://git.kernel.org/stable/c/cc5d59081fa26506d02de2127ab822f40d88bc5a",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix client side handling of tls alerts\n\nA security exploit was discovered in NFS over TLS in tls_alert_recv\ndue to its assumption that there is valid data in the msghdr's\niterator's kvec.\n\nInstead, this patch proposes the rework how control messages are\nsetup and used by sock_recvmsg().\n\nIf no control message structure is setup, kTLS layer will read and\nprocess TLS data record types. As soon as it encounters a TLS control\nmessage, it would return an error. At that point, NFS can setup a kvec\nbacked control buffer and read in the control message such as a TLS\nalert. Scott found that a msg iterator can advance the kvec pointer\nas a part of the copy process thus we need to revert the iterator\nbefore calling into the tls_alert_recv."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38570",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/21d3f8441c7f317b93ba6a8029610c8b7e3773db",
          "name" : "https://git.kernel.org/stable/c/21d3f8441c7f317b93ba6a8029610c8b7e3773db",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4b31bcb025cb497da2b01f87173108ff32d350d2",
          "name" : "https://git.kernel.org/stable/c/4b31bcb025cb497da2b01f87173108ff32d350d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4b59f9deff3bdb52b223c85048f1d2924803b817",
          "name" : "https://git.kernel.org/stable/c/4b59f9deff3bdb52b223c85048f1d2924803b817",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\neth: fbnic: unlink NAPIs from queues on error to open\n\nCI hit a UaF in fbnic in the AF_XDP portion of the queues.py test.\nThe UaF is in the __sk_mark_napi_id_once() call in xsk_bind(),\nNAPI has been freed. Looks like the device failed to open earlier,\nand we lack clearing the NAPI pointer from the queue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38569",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0ddfe8b127ef1149fddccb79db6e6eaba7738e7d",
          "name" : "https://git.kernel.org/stable/c/0ddfe8b127ef1149fddccb79db6e6eaba7738e7d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/46d44a23a3723a89deeb65b13cddb17f8d9f2700",
          "name" : "https://git.kernel.org/stable/c/46d44a23a3723a89deeb65b13cddb17f8d9f2700",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63",
          "name" : "https://git.kernel.org/stable/c/5a40f8af2ba1b9bdf46e2db10e8c9710538fbc63",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c377ba2be9430d165a98e4b782902ed630bc7546",
          "name" : "https://git.kernel.org/stable/c/c377ba2be9430d165a98e4b782902ed630bc7546",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d5dc09ee5d74277bc47193fe28ce8703e229331b",
          "name" : "https://git.kernel.org/stable/c/d5dc09ee5d74277bc47193fe28ce8703e229331b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e",
          "name" : "https://git.kernel.org/stable/c/f4e4e0c4bc4d799d6fa39055acdbc3af066cd13e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbenet: fix BUG when creating VFs\n\nbenet crashes as soon as SRIOV VFs are created:\n\n kernel BUG at mm/vmalloc.c:3457!\n Oops: invalid opcode: 0000 [#1] SMP KASAN NOPTI\n CPU: 4 UID: 0 PID: 7408 Comm: test.sh Kdump: loaded Not tainted 6.16.0+ #1 PREEMPT(voluntary)\n [...]\n RIP: 0010:vunmap+0x5f/0x70\n [...]\n Call Trace:\n  <TASK>\n  __iommu_dma_free+0xe8/0x1c0\n  be_cmd_set_mac_list+0x3fe/0x640 [be2net]\n  be_cmd_set_mac+0xaf/0x110 [be2net]\n  be_vf_eth_addr_config+0x19f/0x330 [be2net]\n  be_vf_setup+0x4f7/0x990 [be2net]\n  be_pci_sriov_configure+0x3a1/0x470 [be2net]\n  sriov_numvfs_store+0x20b/0x380\n  kernfs_fop_write_iter+0x354/0x530\n  vfs_write+0x9b9/0xf60\n  ksys_write+0xf3/0x1d0\n  do_syscall_64+0x8c/0x3d0\n\nbe_cmd_set_mac_list() calls dma_free_coherent() under a spin_lock_bh.\nFix it by freeing only after the lock has been released."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38568",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/39491e859fd494d0b51adc5c7d54c8a7dcf1d198",
          "name" : "https://git.kernel.org/stable/c/39491e859fd494d0b51adc5c7d54c8a7dcf1d198",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/66fc2ebdd9d5dd6e5a9c7edeace5a61a0ab2cd86",
          "name" : "https://git.kernel.org/stable/c/66fc2ebdd9d5dd6e5a9c7edeace5a61a0ab2cd86",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d00e4125680f7074c4f42ce3c297336f23128e70",
          "name" : "https://git.kernel.org/stable/c/d00e4125680f7074c4f42ce3c297336f23128e70",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f1a9dbcb7d17bf0abb325cdc984957cfabc59693",
          "name" : "https://git.kernel.org/stable/c/f1a9dbcb7d17bf0abb325cdc984957cfabc59693",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ffd2dc4c6c49ff4f1e5d34e454a6a55608104c17",
          "name" : "https://git.kernel.org/stable/c/ffd2dc4c6c49ff4f1e5d34e454a6a55608104c17",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: mqprio: fix stack out-of-bounds write in tc entry parsing\n\nTCA_MQPRIO_TC_ENTRY_INDEX is validated using\nNLA_POLICY_MAX(NLA_U32, TC_QOPT_MAX_QUEUE), which allows the value\nTC_QOPT_MAX_QUEUE (16). This leads to a 4-byte out-of-bounds stack\nwrite in the fp[] array, which only has room for 16 elements (0–15).\n\nFix this by changing the policy to allow only up to TC_QOPT_MAX_QUEUE - 1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38567",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/c4bf8f26c51e51bbb840935659a7b3b65a802c07",
          "name" : "https://git.kernel.org/stable/c/c4bf8f26c51e51bbb840935659a7b3b65a802c07",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e5a73150776f18547ee685c9f6bfafe549714899",
          "name" : "https://git.kernel.org/stable/c/e5a73150776f18547ee685c9f6bfafe549714899",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fcb0a417fddb605530c4837e0996620f8ed38023",
          "name" : "https://git.kernel.org/stable/c/fcb0a417fddb605530c4837e0996620f8ed38023",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: avoid ref leak in nfsd_open_local_fh()\n\nIf two calls to nfsd_open_local_fh() race and both successfully call\nnfsd_file_acquire_local(), they will both get an extra reference to the\nnet to accompany the file reference stored in *pnf.\n\nOne of them will fail to store (using xchg()) the file reference in\n*pnf and will drop that reference but WON'T drop the accompanying\nreference to the net.  This leak means that when the nfs server is shut\ndown it will hang in nfsd_shutdown_net() waiting for\n&nn->nfsd_net_free_done.\n\nThis patch adds the missing nfsd_net_put()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38566",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/25bb3647d30a20486b5fe7cff2b0e503c16c9692",
          "name" : "https://git.kernel.org/stable/c/25bb3647d30a20486b5fe7cff2b0e503c16c9692",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3b549da875414989f480b66835d514be80a0bd9c",
          "name" : "https://git.kernel.org/stable/c/3b549da875414989f480b66835d514be80a0bd9c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6b33c31cc788073bfbed9297e1f4486ed73d87da",
          "name" : "https://git.kernel.org/stable/c/6b33c31cc788073bfbed9297e1f4486ed73d87da",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b1df394621710b312f0393e3f240fdac0764f968",
          "name" : "https://git.kernel.org/stable/c/b1df394621710b312f0393e3f240fdac0764f968",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bee47cb026e762841f3faece47b51f985e215edb",
          "name" : "https://git.kernel.org/stable/c/bee47cb026e762841f3faece47b51f985e215edb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nsunrpc: fix handling of server side tls alerts\n\nScott Mayhew discovered a security exploit in NFS over TLS in\ntls_alert_recv() due to its assumption it can read data from\nthe msg iterator's kvec..\n\nkTLS implementation splits TLS non-data record payload between\nthe control message buffer (which includes the type such as TLS\naler or TLS cipher change) and the rest of the payload (say TLS\nalert's level/description) which goes into the msg payload buffer.\n\nThis patch proposes to rework how control messages are setup and\nused by sock_recvmsg().\n\nIf no control message structure is setup, kTLS layer will read and\nprocess TLS data record types. As soon as it encounters a TLS control\nmessage, it would return an error. At that point, NFS can setup a\nkvec backed msg buffer and read in the control message such as a\nTLS alert. Msg iterator can advance the kvec pointer as a part of\nthe copy process thus we need to revert the iterator before calling\ninto the tls_alert_recv."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38565",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0",
          "name" : "https://git.kernel.org/stable/c/07091aade394f690e7b655578140ef84d0e8d7b0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92",
          "name" : "https://git.kernel.org/stable/c/163b0d1a209fe0df5476c1df2330ca12b55abf92",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd",
          "name" : "https://git.kernel.org/stable/c/27d44145bd576bbef9bf6165bcd78128ec3e6cbd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650",
          "name" : "https://git.kernel.org/stable/c/7ff8521f30c4c2fcd4e88bd7640486602bf8a650",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9",
          "name" : "https://git.kernel.org/stable/c/92043120a2e992800580855498ab8507e1b22db9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432",
          "name" : "https://git.kernel.org/stable/c/f41e9eba77bf97626e04296dc5677d02816d2432",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Exit early on perf_mmap() fail\n\nWhen perf_mmap() fails to allocate a buffer, it still invokes the\nevent_mapped() callback of the related event. On X86 this might increase\nthe perf_rdpmc_allowed reference counter. But nothing undoes this as\nperf_mmap_close() is never called in this case, which causes another\nreference count leak.\n\nReturn early on failure to prevent that."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38564",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/831e1c90a5d72e6977a57c44f47c46b73a438695",
          "name" : "https://git.kernel.org/stable/c/831e1c90a5d72e6977a57c44f47c46b73a438695",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a9025f73c88d9d6e125743a43afc569da3ce5328",
          "name" : "https://git.kernel.org/stable/c/a9025f73c88d9d6e125743a43afc569da3ce5328",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f74b9f4ba63ffdf597aaaa6cad7e284cb8e04820",
          "name" : "https://git.kernel.org/stable/c/f74b9f4ba63ffdf597aaaa6cad7e284cb8e04820",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Handle buffer mapping fail correctly in perf_mmap()\n\nAfter successful allocation of a buffer or a successful attachment to an\nexisting buffer perf_mmap() tries to map the buffer read only into the page\ntable. If that fails, the already set up page table entries are zapped, but\nthe other perf specific side effects of that failure are not handled.  The\ncalling code just cleans up the VMA and does not invoke perf_mmap_close().\n\nThis leaks reference counts, corrupts user->vm accounting and also results\nin an unbalanced invocation of event::event_mapped().\n\nCure this by moving the event::event_mapped() invocation before the\nmap_range() call so that on map_range() failure perf_mmap_close() can be\ninvoked without causing an unbalanced event::event_unmapped() call.\n\nperf_mmap_close() undoes the reference counts and eventually frees buffers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38563",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb",
          "name" : "https://git.kernel.org/stable/c/65311aad4c808bedad0c05d9bb8b06c47dae73eb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121",
          "name" : "https://git.kernel.org/stable/c/6757a31a8e295ae4f01717a954afda173f25a121",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b",
          "name" : "https://git.kernel.org/stable/c/7b84cb58d1f0aa07656802eae24689566e5f5b1b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6",
          "name" : "https://git.kernel.org/stable/c/b024d7b56c77191cde544f838debb7f8451cd0d6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f",
          "name" : "https://git.kernel.org/stable/c/e529888b7e8092912dd8789bdfc76685ccd2ff5f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd",
          "name" : "https://git.kernel.org/stable/c/ff668930871e0198c7f4e325058b8b7c286787bd",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Prevent VMA split of buffer mappings\n\nThe perf mmap code is careful about mmap()'ing the user page with the\nringbuffer and additionally the auxiliary buffer, when the event supports\nit. Once the first mapping is established, subsequent mapping have to use\nthe same offset and the same size in both cases. The reference counting for\nthe ringbuffer and the auxiliary buffer depends on this being correct.\n\nThough perf does not prevent that a related mapping is split via mmap(2),\nmunmap(2) or mremap(2). A split of a VMA results in perf_mmap_open() calls,\nwhich take reference counts, but then the subsequent perf_mmap_close()\ncalls are not longer fulfilling the offset and size checks. This leads to\nreference count leaks.\n\nAs perf already has the requirement for subsequent mappings to match the\ninitial mapping, the obvious consequence is that VMA splits, caused by\nresizing of a mapping or partial unmapping, have to be prevented.\n\nImplement the vm_operations_struct::may_split() callback and return\nunconditionally -EINVAL.\n\nThat ensures that the mapping offsets and sizes cannot be changed after the\nfact. Remapping to a different fixed address with the same size is still\npossible as it takes the references for the new mapping and drops those of\nthe old mapping."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38562",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/015ef163d65496ae3ba6192c96140a22743f0353",
          "name" : "https://git.kernel.org/stable/c/015ef163d65496ae3ba6192c96140a22743f0353",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2a30ed6428ce83afedca1a6c5c5c4247bcf12d0e",
          "name" : "https://git.kernel.org/stable/c/2a30ed6428ce83afedca1a6c5c5c4247bcf12d0e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/96a82e19434a2522525baab59c33332658bc7653",
          "name" : "https://git.kernel.org/stable/c/96a82e19434a2522525baab59c33332658bc7653",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9b493ab6f35178afd8d619800df9071992f715de",
          "name" : "https://git.kernel.org/stable/c/9b493ab6f35178afd8d619800df9071992f715de",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9c2dbbc959e1fcc6f603a1a843e9cf743ba383bb",
          "name" : "https://git.kernel.org/stable/c/9c2dbbc959e1fcc6f603a1a843e9cf743ba383bb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d79c8bebaa622ee223128be7c66d8aaeeb634a57",
          "name" : "https://git.kernel.org/stable/c/d79c8bebaa622ee223128be7c66d8aaeeb634a57",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix null pointer dereference error in generate_encryptionkey\n\nIf client send two session setups with krb5 authenticate to ksmbd,\nnull pointer dereference error in generate_encryptionkey could happen.\nsess->Preauth_HashValue is set to NULL if session is valid.\nSo this patch skip generate encryption key if session is valid."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38561",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6",
          "name" : "https://git.kernel.org/stable/c/44a3059c4c8cc635a1fb2afd692d0730ca1ba4b6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6613887da1d18dd2ecfd6c6148a873c4d903ebdc",
          "name" : "https://git.kernel.org/stable/c/6613887da1d18dd2ecfd6c6148a873c4d903ebdc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7d7c0c5304c88bcbd7a85e9bcd61d27e998ba5fc",
          "name" : "https://git.kernel.org/stable/c/7d7c0c5304c88bcbd7a85e9bcd61d27e998ba5fc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b69fd87076daa66f3d186bd421a7b0ee0cb45829",
          "name" : "https://git.kernel.org/stable/c/b69fd87076daa66f3d186bd421a7b0ee0cb45829",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/edeecc7871e8fc0878d53ce286c75040a0e38f6c",
          "name" : "https://git.kernel.org/stable/c/edeecc7871e8fc0878d53ce286c75040a0e38f6c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fbf5c0845ed15122a770bca9be1d9b60b470d3aa",
          "name" : "https://git.kernel.org/stable/c/fbf5c0845ed15122a770bca9be1d9b60b470d3aa",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix Preauh_HashValue race condition\n\nIf client send multiple session setup requests to ksmbd,\nPreauh_HashValue race condition could happen.\nThere is no need to free sess->Preauh_HashValue at session setup phase.\nIt can be freed together with session at connection termination phase."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38560",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1fb873971e23c35c53823c62809a474a92bc3022",
          "name" : "https://git.kernel.org/stable/c/1fb873971e23c35c53823c62809a474a92bc3022",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1fec416c03d0a64cc21aa04ce4aa14254b017e6a",
          "name" : "https://git.kernel.org/stable/c/1fec416c03d0a64cc21aa04ce4aa14254b017e6a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7b306dfa326f70114312b320d083b21fa9481e1e",
          "name" : "https://git.kernel.org/stable/c/7b306dfa326f70114312b320d083b21fa9481e1e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a762a4c8d9e768b538b3cc60615361a8cf377de8",
          "name" : "https://git.kernel.org/stable/c/a762a4c8d9e768b538b3cc60615361a8cf377de8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/aed15fc08f15dbb15822b2a0b653f67e76aa0fdf",
          "name" : "https://git.kernel.org/stable/c/aed15fc08f15dbb15822b2a0b653f67e76aa0fdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f92af52e6dbd8d066d77beba451e0230482dc45b",
          "name" : "https://git.kernel.org/stable/c/f92af52e6dbd8d066d77beba451e0230482dc45b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sev: Evict cache lines during SNP memory validation\n\nAn SNP cache coherency vulnerability requires a cache line eviction\nmitigation when validating memory after a page state change to private.\nThe specific mitigation is to touch the first and last byte of each 4K\npage that is being validated. There is no need to perform the mitigation\nwhen performing a page state change to shared and rescinding validation.\n\nCPUID bit Fn8000001F_EBX[31] defines the COHERENCY_SFW_NO CPUID bit\nthat, when set, indicates that the software mitigation for this\nvulnerability is not needed.\n\nImplement the mitigation and invoke it when validating memory (making it\nprivate) and the COHERENCY_SFW_NO bit is not set, indicating the SNP\nguest is vulnerable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38559",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/089d05266b2caf020ac2ae2cd2be78f580268f5d",
          "name" : "https://git.kernel.org/stable/c/089d05266b2caf020ac2ae2cd2be78f580268f5d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/18d53b543b5447478e259c96ca4688393f327c98",
          "name" : "https://git.kernel.org/stable/c/18d53b543b5447478e259c96ca4688393f327c98",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/54d5cd4719c5e87f33d271c9ac2e393147d934f8",
          "name" : "https://git.kernel.org/stable/c/54d5cd4719c5e87f33d271c9ac2e393147d934f8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/860d93bd6a21f08883711196344c353bc3936a2b",
          "name" : "https://git.kernel.org/stable/c/860d93bd6a21f08883711196344c353bc3936a2b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nplatform/x86/intel/pmt: fix a crashlog NULL pointer access\n\nUsage of the intel_pmt_read() for binary sysfs, requires a pcidev. The\ncurrent use of the endpoint value is only valid for telemetry endpoint\nusage.\n\nWithout the ep, the crashlog usage causes the following NULL pointer\nexception:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\nOops: Oops: 0000 [#1] SMP NOPTI\nRIP: 0010:intel_pmt_read+0x3b/0x70 [pmt_class]\nCode:\nCall Trace:\n <TASK>\n ? sysfs_kf_bin_read+0xc0/0xe0\n kernfs_fop_read_iter+0xac/0x1a0\n vfs_read+0x26d/0x350\n ksys_read+0x6b/0xe0\n __x64_sys_read+0x1d/0x30\n x64_sys_call+0x1bc8/0x1d70\n do_syscall_64+0x6d/0x110\n\nAugment struct intel_pmt_entry with a pointer to the pcidev to avoid\nthe NULL pointer exception."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38558",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/323a80a1a5ace319a722909c006d5bdb2a35d273",
          "name" : "https://git.kernel.org/stable/c/323a80a1a5ace319a722909c006d5bdb2a35d273",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6db61c1aa23075eeee90e083ca3f6567a5635da6",
          "name" : "https://git.kernel.org/stable/c/6db61c1aa23075eeee90e083ca3f6567a5635da6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7f8576fc9d1a203d12474bf52710c7af68cae490",
          "name" : "https://git.kernel.org/stable/c/7f8576fc9d1a203d12474bf52710c7af68cae490",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget: uvc: Initialize frame-based format color matching descriptor\n\nFix NULL pointer crash in uvcg_framebased_make due to uninitialized color\nmatching descriptor for frame-based format which was added in\ncommit f5e7bdd34aca (\"usb: gadget: uvc: Allow creating new color matching\ndescriptors\") that added handling for uncompressed and mjpeg format.\n\nCrash is seen when userspace configuration (via configfs) does not\nexplicitly define the color matching descriptor. If color_matching is not\nfound, config_group_find_item() returns NULL. The code then jumps to\nout_put_cm, where it calls config_item_put(color_matching);. If\ncolor_matching is NULL, this will dereference a null pointer, leading to a\ncrash.\n\n[    2.746440] Unable to handle kernel NULL pointer dereference at virtual address 000000000000008c\n[    2.756273] Mem abort info:\n[    2.760080]   ESR = 0x0000000096000005\n[    2.764872]   EC = 0x25: DABT (current EL), IL = 32 bits\n[    2.771068]   SET = 0, FnV = 0\n[    2.771069]   EA = 0, S1PTW = 0\n[    2.771070]   FSC = 0x05: level 1 translation fault\n[    2.771071] Data abort info:\n[    2.771072]   ISV = 0, ISS = 0x00000005, ISS2 = 0x00000000\n[    2.771073]   CM = 0, WnR = 0, TnD = 0, TagAccess = 0\n[    2.771074]   GCS = 0, Overlay = 0, DirtyBit = 0, Xs = 0\n[    2.771075] user pgtable: 4k pages, 39-bit VAs, pgdp=00000000a3e59000\n[    2.771077] [000000000000008c] pgd=0000000000000000, p4d=0000000000000000, pud=0000000000000000\n[    2.771081] Internal error: Oops: 0000000096000005 [#1] PREEMPT SMP\n[    2.771084] Dumping ftrace buffer:\n[    2.771085]    (ftrace buffer empty)\n[    2.771138] CPU: 7 PID: 486 Comm: ln Tainted: G        W   E      6.6.58-android15\n[    2.771139] Hardware name: Qualcomm Technologies, Inc. SunP QRD HDK (DT)\n[    2.771140] pstate: 61400005 (nZCv daif +PAN -UAO -TCO +DIT -SSBS BTYPE=--)\n[    2.771141] pc : __uvcg_fill_strm+0x198/0x2cc\n[    2.771145] lr : __uvcg_iter_strm_cls+0xc8/0x17c\n[    2.771146] sp : ffffffc08140bbb0\n[    2.771146] x29: ffffffc08140bbb0 x28: ffffff803bc81380 x27: ffffff8023bbd250\n[    2.771147] x26: ffffff8023bbd250 x25: ffffff803c361348 x24: ffffff803d8e6768\n[    2.771148] x23: 0000000000000004 x22: 0000000000000003 x21: ffffffc08140bc48\n[    2.771149] x20: 0000000000000000 x19: ffffffc08140bc48 x18: ffffffe9f8cf4a00\n[    2.771150] x17: 000000001bf64ec3 x16: 000000001bf64ec3 x15: ffffff8023bbd250\n[    2.771151] x14: 000000000000000f x13: 004c4b40000f4240 x12: 000a2c2a00051615\n[    2.771152] x11: 000000000000004f x10: ffffffe9f76b40ec x9 : ffffffe9f7e389d0\n[    2.771153] x8 : ffffff803d0d31ce x7 : 000f4240000a2c2a x6 : 0005161500028b0a\n[    2.771154] x5 : ffffff803d0d31ce x4 : 0000000000000003 x3 : 0000000000000000\n[    2.771155] x2 : ffffffc08140bc50 x1 : ffffffc08140bc48 x0 : 0000000000000000\n[    2.771156] Call trace:\n[    2.771157]  __uvcg_fill_strm+0x198/0x2cc\n[    2.771157]  __uvcg_iter_strm_cls+0xc8/0x17c\n[    2.771158]  uvcg_streaming_class_allow_link+0x240/0x290\n[    2.771159]  configfs_symlink+0x1f8/0x630\n[    2.771161]  vfs_symlink+0x114/0x1a0\n[    2.771163]  do_symlinkat+0x94/0x28c\n[    2.771164]  __arm64_sys_symlinkat+0x54/0x70\n[    2.771164]  invoke_syscall+0x58/0x114\n[    2.771166]  el0_svc_common+0x80/0xe0\n[    2.771168]  do_el0_svc+0x1c/0x28\n[    2.771169]  el0_svc+0x3c/0x70\n[    2.771172]  el0t_64_sync_handler+0x68/0xbc\n[    2.771173]  el0t_64_sync+0x1a8/0x1ac\n\nInitialize color matching descriptor for frame-based format to prevent\nNULL pointer crash by mirroring the handling done for uncompressed and\nmjpeg formats."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38557",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/00896c3f41cb6b74fec853386076115ba50baf0a",
          "name" : "https://git.kernel.org/stable/c/00896c3f41cb6b74fec853386076115ba50baf0a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1bb3363da862e0464ec050eea2fb5472a36ad86b",
          "name" : "https://git.kernel.org/stable/c/1bb3363da862e0464ec050eea2fb5472a36ad86b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7e15d1eaa88179c5185e57a38ab05fe852d0cb8d",
          "name" : "https://git.kernel.org/stable/c/7e15d1eaa88179c5185e57a38ab05fe852d0cb8d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ba08cc6801ec5fb98f2d02b5f0c614c931845325",
          "name" : "https://git.kernel.org/stable/c/ba08cc6801ec5fb98f2d02b5f0c614c931845325",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: apple: validate feature-report field count to prevent NULL pointer dereference\n\nA malicious HID device with quirk APPLE_MAGIC_BACKLIGHT can trigger a NULL\npointer dereference whilst the power feature-report is toggled and sent to\nthe device in apple_magic_backlight_report_set(). The power feature-report\nis expected to have two data fields, but if the descriptor declares one\nfield then accessing field[1] and dereferencing it in\napple_magic_backlight_report_set() becomes invalid\nsince field[1] will be NULL.\n\nAn example of a minimal descriptor which can cause the crash is something\nlike the following where the report with ID 3 (power report) only\nreferences a single 1-byte field. When hid core parses the descriptor it\nwill encounter the final feature tag, allocate a hid_report (all members\nof field[] will be zeroed out), create field structure and populate it,\nincreasing the maxfield to 1. The subsequent field[1] access and\ndereference causes the crash.\n\n  Usage Page (Vendor Defined 0xFF00)\n  Usage (0x0F)\n  Collection (Application)\n    Report ID (1)\n    Usage (0x01)\n    Logical Minimum (0)\n    Logical Maximum (255)\n    Report Size (8)\n    Report Count (1)\n    Feature (Data,Var,Abs)\n\n    Usage (0x02)\n    Logical Maximum (32767)\n    Report Size (16)\n    Report Count (1)\n    Feature (Data,Var,Abs)\n\n    Report ID (3)\n    Usage (0x03)\n    Logical Minimum (0)\n    Logical Maximum (1)\n    Report Size (8)\n    Report Count (1)\n    Feature (Data,Var,Abs)\n  End Collection\n\nHere we see the KASAN splat when the kernel dereferences the\nNULL pointer and crashes:\n\n  [   15.164723] Oops: general protection fault, probably for non-canonical address 0xdffffc0000000006: 0000 [#1] SMP KASAN NOPTI\n  [   15.165691] KASAN: null-ptr-deref in range [0x0000000000000030-0x0000000000000037]\n  [   15.165691] CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Not tainted 6.15.0 #31 PREEMPT(voluntary)\n  [   15.165691] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n  [   15.165691] RIP: 0010:apple_magic_backlight_report_set+0xbf/0x210\n  [   15.165691] Call Trace:\n  [   15.165691]  <TASK>\n  [   15.165691]  apple_probe+0x571/0xa20\n  [   15.165691]  hid_device_probe+0x2e2/0x6f0\n  [   15.165691]  really_probe+0x1ca/0x5c0\n  [   15.165691]  __driver_probe_device+0x24f/0x310\n  [   15.165691]  driver_probe_device+0x4a/0xd0\n  [   15.165691]  __device_attach_driver+0x169/0x220\n  [   15.165691]  bus_for_each_drv+0x118/0x1b0\n  [   15.165691]  __device_attach+0x1d5/0x380\n  [   15.165691]  device_initial_probe+0x12/0x20\n  [   15.165691]  bus_probe_device+0x13d/0x180\n  [   15.165691]  device_add+0xd87/0x1510\n  [...]\n\nTo fix this issue we should validate the number of fields that the\nbacklight and power reports have and if they do not have the required\nnumber of fields then bail."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38556",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "name" : "https://git.kernel.org/stable/c/865ad8469fa24de1559f247d9426ab01e5ce3a56",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "name" : "https://git.kernel.org/stable/c/8b4a94b1510f6a46ec48494b52ee8f67eb4fc836",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "name" : "https://git.kernel.org/stable/c/a6b87bfc2ab5bccb7ad953693c85d9062aef3fdd",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: core: Harden s32ton() against conversion to 0 bits\n\nTesting by the syzbot fuzzer showed that the HID core gets a\nshift-out-of-bounds exception when it tries to convert a 32-bit\nquantity to a 0-bit quantity.  Ideally this should never occur, but\nthere are buggy devices and some might have a report field with size\nset to zero; we shouldn't reject the report or the device just because\nof that.\n\nInstead, harden the s32ton() routine so that it returns a reasonable\nresult instead of crashing when it is called with the number of bits\nset to 0 -- the same as what snto32() does."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38555",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e",
          "name" : "https://git.kernel.org/stable/c/151c0aa896c47a4459e07fee7d4843f44c1bb18e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963",
          "name" : "https://git.kernel.org/stable/c/5f06ee9f9a3665d43133f125c17e5258a13f3963",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9",
          "name" : "https://git.kernel.org/stable/c/aada327a9f8028c573636fa60c0abc80fb8135c9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba",
          "name" : "https://git.kernel.org/stable/c/bd3c4ef60baf7f65c963f3e12d9d7b2b091e20ba",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355",
          "name" : "https://git.kernel.org/stable/c/e1be1f380c82a69f80c68c96a7cfe8759fb30355",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835",
          "name" : "https://git.kernel.org/stable/c/e624bf26127645a2f7821e73fdf6dc64bad07835",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: gadget : fix use-after-free in composite_dev_cleanup()\n\n1. In func configfs_composite_bind() -> composite_os_desc_req_prepare():\nif kmalloc fails, the pointer cdev->os_desc_req will be freed but not\nset to NULL. Then it will return a failure to the upper-level function.\n2. in func configfs_composite_bind() -> composite_dev_cleanup():\nit will checks whether cdev->os_desc_req is NULL. If it is not NULL, it\nwill attempt to use it.This will lead to a use-after-free issue.\n\nBUG: KASAN: use-after-free in composite_dev_cleanup+0xf4/0x2c0\nRead of size 8 at addr 0000004827837a00 by task init/1\n\nCPU: 10 PID: 1 Comm: init Tainted: G           O      5.10.97-oh #1\n kasan_report+0x188/0x1cc\n __asan_load8+0xb4/0xbc\n composite_dev_cleanup+0xf4/0x2c0\n configfs_composite_bind+0x210/0x7ac\n udc_bind_to_driver+0xb4/0x1ec\n usb_gadget_probe_driver+0xec/0x21c\n gadget_dev_desc_UDC_store+0x264/0x27c"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38554",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1bcd236a2536a451e385f8d6d2bb589689ec812f",
          "name" : "https://git.kernel.org/stable/c/1bcd236a2536a451e385f8d6d2bb589689ec812f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6e88fe54721dee17d3496bc998f0c7d243896348",
          "name" : "https://git.kernel.org/stable/c/6e88fe54721dee17d3496bc998f0c7d243896348",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9bbffee67ffd16360179327b57f3b1245579ef08",
          "name" : "https://git.kernel.org/stable/c/9bbffee67ffd16360179327b57f3b1245579ef08",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nmm: fix a UAF when vma->mm is freed after vma->vm_refcnt got dropped\n\nBy inducing delays in the right places, Jann Horn created a reproducer for\na hard to hit UAF issue that became possible after VMAs were allowed to be\nrecycled by adding SLAB_TYPESAFE_BY_RCU to their cache.\n\nRace description is borrowed from Jann's discovery report:\nlock_vma_under_rcu() looks up a VMA locklessly with mas_walk() under\nrcu_read_lock().  At that point, the VMA may be concurrently freed, and it\ncan be recycled by another process.  vma_start_read() then increments the\nvma->vm_refcnt (if it is in an acceptable range), and if this succeeds,\nvma_start_read() can return a recycled VMA.\n\nIn this scenario where the VMA has been recycled, lock_vma_under_rcu()\nwill then detect the mismatching ->vm_mm pointer and drop the VMA through\nvma_end_read(), which calls vma_refcount_put().  vma_refcount_put() drops\nthe refcount and then calls rcuwait_wake_up() using a copy of vma->vm_mm. \nThis is wrong: It implicitly assumes that the caller is keeping the VMA's\nmm alive, but in this scenario the caller has no relation to the VMA's mm,\nso the rcuwait_wake_up() can cause UAF.\n\nThe diagram depicting the race:\nT1         T2         T3\n==         ==         ==\nlock_vma_under_rcu\n  mas_walk\n          <VMA gets removed from mm>\n                      mmap\n                        <the same VMA is reallocated>\n  vma_start_read\n    __refcount_inc_not_zero_limited_acquire\n                      munmap\n                        __vma_enter_locked\n                          refcount_add_not_zero\n  vma_end_read\n    vma_refcount_put\n      __refcount_dec_and_test\n                          rcuwait_wait_event\n                            <finish operation>\n      rcuwait_wake_up [UAF]\n\nNote that rcuwait_wait_event() in T3 does not block because refcount was\nalready dropped by T1.  At this point T3 can exit and free the mm causing\nUAF in T1.\n\nTo avoid this we move vma->vm_mm verification into vma_start_read() and\ngrab vma->vm_mm to stabilize it before vma_refcount_put() operation.\n\n[surenb@google.com: v3]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9146",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Linksys/E5600.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320525",
          "name" : "VDB-320525 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320525",
          "name" : "VDB-320525 | Linksys E5600 Firmware checkFw.sh verify_gemtek_header risky encryption",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628642",
          "name" : "Submit #628642 | Linksys E5600 1.1.0.26 CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in Linksys E5600 1.1.0.26. The affected element is the function verify_gemtek_header of the file checkFw.sh of the component Firmware Handler. Executing manipulation can lead to risky cryptographic algorithm. The attack may be launched remotely. The attack requires a high level of complexity. The exploitability is described as difficult. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9145",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/5.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/5.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/5.md#poc",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/5.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320523",
          "name" : "VDB-320523 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320523",
          "name" : "VDB-320523 | Scada-LTS SVG File view_edit.shtm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628448",
          "name" : "Submit #628448 | Scada-LTS 2.7.8.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security vulnerability has been detected in Scada-LTS 2.7.8.1. This issue affects some unknown processing of the file view_edit.shtm of the component SVG File Handler. Such manipulation of the argument backgroundImageMP leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed publicly and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8782",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51540",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://ballpoint.fr/en/blog/ezged3-preauth-file-read-admin-takeover",
          "name" : "https://ballpoint.fr/en/blog/ezged3-preauth-file-read-admin-takeover",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EzGED3 3.5.0 stores user passwords using an insecure hashing scheme: md5(md5(password)). This hashing method is cryptographically weak and allows attackers to perform efficient offline brute-force attacks if password hashes are disclosed. The lack of salting and use of a fast, outdated algorithm makes it feasible to recover plaintext credentials using precomputed tables or GPU-based cracking tools. The vendor states that the issue is fixed in 3.5.72.27183."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51539",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://ballpoint.fr/en/blog/ezged3-preauth-file-read-admin-takeover",
          "name" : "https://ballpoint.fr/en/blog/ezged3-preauth-file-read-admin-takeover",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EzGED3 3.5.0 contains an unauthenticated arbitrary file read vulnerability due to improper access control and insufficient input validation in a script exposed via the web interface. A remote attacker can supply a crafted path parameter to a PHP script to read arbitrary files from the filesystem. The script lacks both authentication checks and secure path handling, allowing directory traversal attacks (e.g., ../../../) to access sensitive files such as configuration files, database dumps, source code, and password reset tokens. If phpMyAdmin is exposed, extracted credentials can be used for direct administrative access. In environments without such tools, attacker-controlled file reads still allow full database extraction by targeting raw MySQL data files. The vendor states that the issue is fixed in 3.5.72.27183."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50938",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhblue/hustoj",
          "name" : "https://github.com/zhblue/hustoj",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/zhblue/hustoj/issues/1093",
          "name" : "https://github.com/zhblue/hustoj/issues/1093",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross site scripting (XSS) vulnerability in Hustoj 2025-01-31 via the TID parameter to thread.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50434",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/Exploit097/11f87812186012efa3ffd9d1fec152ed",
          "name" : "https://gist.github.com/Exploit097/11f87812186012efa3ffd9d1fec152ed",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue has been identified in Appian Enterprise Business Process Management version 25.3. The vulnerability is related to incorrect access control, which under certain conditions could allow unauthorized access to information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43738",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43738",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43738",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13 and 2024.Q1.1 through 2024.Q1.19 allows a remote authenticated user to inject JavaScript code via _com_liferay_expando_web_portlet_ExpandoPortlet_displayType parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T16:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9144",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/4.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/4.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320522",
          "name" : "VDB-320522 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320522",
          "name" : "VDB-320522 | Scada-LTS publisher_edit.shtm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628445",
          "name" : "Submit #628445 | Scada-LTS 2.7.8.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A weakness has been identified in Scada-LTS 2.7.8.1. This vulnerability affects unknown code of the file publisher_edit.shtm. This manipulation of the argument Name causes cross site scripting. The attack can be initiated remotely. The exploit has been made available to the public and could be exploited."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9143",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/3.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/3.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/3.md#poc",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/3.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320521",
          "name" : "VDB-320521 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320521",
          "name" : "VDB-320521 | Scada-LTS mailing_lists.shtm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628437",
          "name" : "Submit #628437 | Scada-LTS 2.7.8.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in Scada-LTS 2.7.8.1. This affects an unknown part of the file mailing_lists.shtm. The manipulation of the argument name/userList/address results in cross site scripting. It is possible to launch the attack remotely. The exploit has been released to the public and may be exploited."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51529",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://cookies.com",
          "name" : "http://cookies.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://johan.com",
          "name" : "http://johan.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/piotrmaciejbednarski/f738145c0ab24a110649dc16907e395b",
          "name" : "https://gist.github.com/piotrmaciejbednarski/f738145c0ab24a110649dc16907e395b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/piotrmaciejbednarski/CVE-2025-51529",
          "name" : "https://github.com/piotrmaciejbednarski/CVE-2025-51529",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Access Control in the AJAX endpoint functionality in jonkastonka Cookies and Content Security Policy plugin through version 2.29 allows remote attackers to cause a denial of service (database server resource exhaustion) via unlimited database write operations to the wp_ajax_nopriv_cacsp_insert_consent_data endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51510",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "name" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/moonshine-software/moonshine",
          "name" : "https://github.com/moonshine-software/moonshine",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MoonShine v3.12.5 was discovered to contain a SQL injection vulnerability via the Data parameter under the Blog module."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51489",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "name" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/moonshine-software/moonshine",
          "name" : "https://github.com/moonshine-software/moonshine",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An arbitrary file upload vulnerability in MoonShine v3.12.4 allows attackers to execute arbitrary code via uploading a crafted SVG file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51488",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "name" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/moonshine-software/moonshine",
          "name" : "https://github.com/moonshine-software/moonshine",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored cross-site scripting (XSS) vulnerability in the Create Admin function of MoonShine v3.12.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Name parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51487",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "name" : "https://github.com/GiacoLenzo2109/MoonShine_Software_PoCs",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/moonshine-software/moonshine",
          "name" : "https://github.com/moonshine-software/moonshine",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored cross-site scripting (XSS) vulnerability in the Create Article function of MoonShine v3.12.3 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the Link parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50897",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LuLuji04/POC-Boomv1.2",
          "name" : "https://github.com/LuLuji04/POC-Boomv1.2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/riscv-boom/riscv-boom",
          "name" : "https://github.com/riscv-boom/riscv-boom",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/riscv-software-src/riscv-isa-sim",
          "name" : "https://github.com/riscv-software-src/riscv-isa-sim",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in riscv-boom SonicBOOM 1.2 (BOOMv1.2) processor implementation, where valid virtual-to-physical address translations configured with write permissions (PTE_W) in SV39 mode may incorrectly trigger a Store/AMO access fault during store instructions (sd). This occurs despite the presence of proper page table entries and valid memory access modes. The fault is reproducible when transitioning into virtual memory and attempting store operations in mapped kernel memory, indicating a potential flaw in the MMU, PMP, or memory access enforcement logic. This may cause unexpected kernel panics or denial of service in systems using BOOMv1.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50579",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NginxProxyManager/nginx-proxy-manager",
          "name" : "https://github.com/NginxProxyManager/nginx-proxy-manager",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4509",
          "name" : "https://github.com/NginxProxyManager/nginx-proxy-manager/issues/4509",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A CORS misconfiguration in Nginx Proxy Manager v2.12.3 allows unauthorized domains to access sensitive data, particularly JWT tokens, due to improper validation of the Origin header. This misconfiguration enables attackers to intercept tokens using a simple browser script and exfiltrate them to a remote attacker-controlled server, potentially leading to unauthorized actions within the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T15:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9140",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320520",
          "name" : "VDB-320520 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320520",
          "name" : "VDB-320520 | Shanghai Lingdang Information Technology Lingdang CRM tabdetail_moduleSave.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628087",
          "name" : "Submit #628087 | Shanghai Lingdang Information Technology Lingdang CRM =V8.6.4.3 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.notion.so/SQL2-2459bb66b0a5802ba8e9ca5bc775fc7d?source=copy_link",
          "name" : "https://www.notion.so/SQL2-2459bb66b0a5802ba8e9ca5bc775fc7d?source=copy_link",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.4.7. Affected by this issue is some unknown functionality of the file /crm/crmapi/erp/tabdetail_moduleSave.php. The manipulation of the argument getvaluestring leads to sql injection. It is possible to initiate the attack remotely. The exploit is publicly available and might be used. Upgrading to version 8.6.5.4 can resolve this issue. The affected component should be upgraded. The vendor explains: \"All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54336",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.plesk.com/hc/en-us/articles/33785727869847-Vulnerability-CVE-2025-54336",
          "name" : "https://support.plesk.com/hc/en-us/articles/33785727869847-Vulnerability-CVE-2025-54336",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.plesk.com/blog/plesk-news-announcements/introducing-plesk-obsidian-18-0-70-anniversary-edition/",
          "name" : "https://www.plesk.com/blog/plesk-news-announcements/introducing-plesk-obsidian-18-0-70-anniversary-edition/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Plesk Obsidian 18.0.70, _isAdminPasswordValid uses an == comparison. Thus, if the correct password is \"0e\" followed by any digit string, then an attacker can login with any other string that evaluates to 0.0 (such as the 0e0 string). This occurs in admin/plib/LoginManager.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50567",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://saurus.com",
          "name" : "http://saurus.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://saurused.com",
          "name" : "http://saurused.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rahulhoysala/security-research/blob/main/CVE-2025-50567.md",
          "name" : "https://github.com/rahulhoysala/security-research/blob/main/CVE-2025-50567.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://in.linkedin.com/in/rahul-hoysala-221a26341",
          "name" : "https://in.linkedin.com/in/rahul-hoysala-221a26341",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Saurus CMS Community Edition 4.7.1 contains a vulnerability in the custom DB::prepare() function, which uses preg_replace() with the deprecated /e (eval) modifier to interpolate SQL query parameters. This leads to injection of user-controlled SQL statements, potentially leading to arbitrary PHP code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50461",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Anchor0221/CVE-2025-50461",
          "name" : "https://github.com/Anchor0221/CVE-2025-50461",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/pytorch/pytorch/blob/main/SECURITY.md#loading-untrusted-data",
          "name" : "https://github.com/pytorch/pytorch/blob/main/SECURITY.md#loading-untrusted-data",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/volcengine/verl",
          "name" : "https://github.com/volcengine/verl",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/volcengine/verl/blob/main/scripts/model_merger.py#L152",
          "name" : "https://github.com/volcengine/verl/blob/main/scripts/model_merger.py#L152",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://pytorch.org/docs/stable/generated/torch.load.html",
          "name" : "https://pytorch.org/docs/stable/generated/torch.load.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A deserialization vulnerability exists in Volcengine's verl 3.0.0, specifically in the scripts/model_merger.py script when using the \"fsdp\" backend. The script calls torch.load() with weights_only=False on user-supplied .pt files, allowing attackers to execute arbitrary code if a maliciously crafted model file is loaded. An attacker can exploit this by convincing a victim to download and place a malicious model file in a local directory with a specific filename pattern. This vulnerability may lead to arbitrary code execution with the privileges of the user running the script."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4690",
        "ASSIGNER" : "disclosures@herodevs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77",
          "name" : "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-4690",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-4690",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-4690",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-4690",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77",
          "name" : "https://codepen.io/herodevs/pen/RNNEPzP/751b91eab7730dff277523f3d50e4b77",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A regular expression used by AngularJS'  linky https://docs.angularjs.org/api/ngSanitize/filter/linky  filter to detect URLs in input text is vulnerable to super-linear runtime due to backtracking. With a large carefully-crafted input, this can cause a \n\n Regular expression Denial of Service (ReDoS) https://owasp.org/www-community/attacks/Regular_expression_Denial_of_Service_-_ReDoS  attack on the application.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4046",
        "ASSIGNER" : "securityalerts@lexmark.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "name" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A missing authorization vulnerability in Lexmark Cloud Services badge management allows attacker to reassign badges within their organization"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4044",
        "ASSIGNER" : "securityalerts@lexmark.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "name" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of XML External Entity Reference in various Lexmark printer drivers for Windows allows attacker to disclose sensitive information to an arbitrary URL."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43739",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-203"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43739",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43739",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allow any authenticated user to modify the content of emails sent through the calendar portlet, allowing an attacker to send phishing emails to any other user in the same organization."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-45062",
        "ASSIGNER" : "talos-cna@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071",
          "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2024-2071",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stack based buffer overflow vulnerability is present in OpenPrinting ippusbxd 1.34. A specially configured printer that supports IPP-over-USB can cause a buffer overflow which can lead to a arbitrary code execution in a privileged service. To trigger the vulnerability, a malicious device would need to be connected to the vulnerable system over USB."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-19T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9139",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md#proof-of-concept-poc",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md#proof-of-concept-poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320519",
          "name" : "VDB-320519 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320519",
          "name" : "VDB-320519 | Scada-LTS WatchListDwr.init.dwr information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.621062",
          "name" : "Submit #621062 | SCADA-LTS Scada-LTS 2.7.8.1 Exposure of Private Personal Information to an Unauthorized Acto",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md#proof-of-concept-poc",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/Scada-LTS/Sensitive%20User%20Information%20Disclosure%20via%20WatchListDwr.init.dwr%20Endpoint.md#proof-of-concept-poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.621062",
          "name" : "https://vuldb.com/?submit.621062",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Scada-LTS 2.7.8.1. Affected by this vulnerability is an unknown functionality of the file /Scada-LTS/dwr/call/plaincall/WatchListDwr.init.dwr. Executing manipulation can lead to information disclosure. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor explains: \"[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T13:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9138",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/2.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/2.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/2.md#poc",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/2.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320518",
          "name" : "VDB-320518 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320518",
          "name" : "VDB-320518 | Scada-LTS new cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.620516",
          "name" : "Submit #620516 | Scada-LTS 2.7.8.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Scada-LTS 2.7.8.1. Affected is an unknown function of the file pointHierarchy/new/. Performing manipulation of the argument Title results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor explains: \"[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower. An admin user - by definition - has full control over HTML and JS code that is delivered to users in regular synoptic panels. In other words - due to the design of the system it is not possible to limit the admin user to attack the users.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T13:15Z",
    "lastModifiedDate" : "2025-08-19T13:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9137",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md#poc",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320517",
          "name" : "VDB-320517 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320517",
          "name" : "VDB-320517 | Scada-LTS scheduled_events.shtm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.620487",
          "name" : "Submit #620487 | Scada-LTS 2.7.8.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md#poc",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/Scada-LTS/1.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.620487",
          "name" : "https://vuldb.com/?submit.620487",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Scada-LTS 2.7.8.1. This impacts an unknown function of the file scheduled_events.shtm. Such manipulation of the argument alias leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor explains: \"[T]he risks of indicated vulnerabilities seem to be minimal as all scenarios likely require admin permissions. Moreover, regardless our team fixes those vulnerabilities - the overall risk change to the user due to malicious admin actions will not be lower. An admin user - by definition - has full control over HTML and JS code that is delivered to users in regular synoptic panels. In other words - due to the design of the system it is not possible to limit the admin user to attack the users.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T13:15Z",
    "lastModifiedDate" : "2025-08-19T13:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43740",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43740",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43740",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Stored cross-site scripting vulnerability in the Liferay Portal 7.4.3.120 through 7.4.3.132, and Liferay DXP 2025.Q2.0 through 2025.Q2.8, 2025.Q1.0 through 2025.Q1.15, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13 and 2024.Q1.9 through 2024.Q1.19 allows an remote authenticated attacker to inject JavaScript through the message boards feature available via the web interface."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T13:15Z",
    "lastModifiedDate" : "2025-08-19T13:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9136",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/libretro/RetroArch/pull/17555",
          "name" : "https://github.com/libretro/RetroArch/pull/17555",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/libretro/RetroArch/pull/17555#issuecomment-2651403849",
          "name" : "https://github.com/libretro/RetroArch/pull/17555#issuecomment-2651403849",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/libretro/RetroArch/pull/17555/commits/6446f045ec7fc6a5cac3e8ec35a2f0a5889c88e8",
          "name" : "https://github.com/libretro/RetroArch/pull/17555/commits/6446f045ec7fc6a5cac3e8ec35a2f0a5889c88e8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/libretro/RetroArch/releases/tag/v1.21.0",
          "name" : "https://github.com/libretro/RetroArch/releases/tag/v1.21.0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320516",
          "name" : "VDB-320516 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320516",
          "name" : "VDB-320516 | libretro RetroArch file_stream.c filestream_vscanf out-of-bounds",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.617657",
          "name" : "Submit #617657 | libretro RetroArch v1.20.0/v1.19.0/v1.18.0 Out-of-Bounds Read",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.617657",
          "name" : "https://vuldb.com/?submit.617657",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in libretro RetroArch 1.18.0/1.19.0/1.20.0. This affects the function filestream_vscanf of the file libretro-common/streams/file_stream.c. This manipulation causes out-of-bounds read. The attack needs to be launched locally. Upgrading to version 1.21.0 mitigates this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T12:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9135",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320515",
          "name" : "VDB-320515 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320515",
          "name" : "VDB-320515 | Verkehrsauskunft Österreich SmartRide/cleVVVer/BusBahnBim AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.615276",
          "name" : "Submit #615276 | Verkehrsauskunft Österreich SmartRide 12.1.1(258) Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.615278",
          "name" : "Submit #615278 | Verkehrsauskunft Österreich cleVVVer(de.hafas.android.vvv) 12.1.1(258) Task Hijacking (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628235",
          "name" : "Submit #628235 | Verkehrsauskunft Österreich BusBahnBim(de.hafas.android.stv) 12.1.1(258) Hijacking (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/de.hafas.android.vvt.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in Verkehrsauskunft Österreich SmartRide, cleVVVer and BusBahnBim up to 12.1.1(258). The impacted element is an unknown function of the file AndroidManifest.xml. The manipulation results in improper export of android application components. The attack must be initiated from a local position. The exploit is now public and may be used. Upgrading to version 12.1.2(259) is sufficient to resolve this issue. Upgrading the affected component is recommended."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T11:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9134",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320514",
          "name" : "VDB-320514 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320514",
          "name" : "VDB-320514 | AfterShip Package Tracker App com.aftership.AfterShip AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.615253",
          "name" : "Submit #615253 | Aftership(https://www.aftership.com/mobile-app) AfterShip 5.24.1 Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.aftership.AfterShip.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security vulnerability has been detected in AfterShip Package Tracker App up to 5.24.1 on Android. The affected element is an unknown function of the file AndroidManifest.xml of the component com.aftership.AfterShip. The manipulation leads to improper export of android application components. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure and replied: \"After reviewing your report, we have confirmed that this vulnerability does indeed exist and we are actively working to fix it.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T11:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8783",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/contact-manager/trunk/admin-pages-functions.php#L524",
          "name" : "https://plugins.trac.wordpress.org/browser/contact-manager/trunk/admin-pages-functions.php#L524",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3345750/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3345750/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e52a487-8e87-49b7-a044-9fb8452f3dd1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7e52a487-8e87-49b7-a044-9fb8452f3dd1?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Contact Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title’ parameter in all versions up to, and including, 8.6.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-19T11:15Z",
    "lastModifiedDate" : "2025-08-19T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8567",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3342664/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3342664/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/the-plus-addons-for-block-editor/#developers",
          "name" : "https://wordpress.org/plugins/the-plus-addons-for-block-editor/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca9ad8ca-aad1-4950-b540-64ffc4a07c12?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca9ad8ca-aad1-4950-b540-64ffc4a07c12?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Nexter Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple widgets in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-19T09:15Z",
    "lastModifiedDate" : "2025-08-19T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-41689",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://certvde.com/en/advisories/VDE-2025-067",
          "name" : "https://certvde.com/en/advisories/VDE-2025-067",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unauthenticated remote attacker can grant access without password protection to the affected device. This enables the unprotected read-only access to the stored measurement data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T09:15Z",
    "lastModifiedDate" : "2025-08-19T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-41685",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-359"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://certvde.com/en/advisories/VDE-2025-050",
          "name" : "https://certvde.com/en/advisories/VDE-2025-050",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low-privileged remote attacker can obtain the username of another registered Sunny Portal user by entering that user's email address."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-19T09:15Z",
    "lastModifiedDate" : "2025-08-19T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8723",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3337593/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3337593/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3341917/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3341917/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/cf-image-resizing/#developers",
          "name" : "https://wordpress.org/plugins/cf-image-resizing/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3b3c1a-1d45-4e2f-854a-171fe759257b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3b3c1a-1d45-4e2f-854a-171fe759257b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-19T08:15Z",
    "lastModifiedDate" : "2025-08-19T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8622",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/webaware/flexible-map/commit/1cbae2fa98e10c82d82a68e2bacfbdb7231117db",
          "name" : "https://github.com/webaware/flexible-map/commit/1cbae2fa98e10c82d82a68e2bacfbdb7231117db",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3341890/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3341890/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-flexible-map/#developers",
          "name" : "https://wordpress.org/plugins/wp-flexible-map/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cde79196-20aa-42f1-b35f-af347bcb6e5f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cde79196-20aa-42f1-b35f-af347bcb6e5f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Flexible Map plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Flexible Maps shortcode in all versions up to, and including, 1.18.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-19T08:15Z",
    "lastModifiedDate" : "2025-08-19T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7670",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Skatox/jquery-archive-list/commit/1c4a5749b187cc65d2c4b192b9c9890a36bf1fd2",
          "name" : "https://github.com/Skatox/jquery-archive-list/commit/1c4a5749b187cc65d2c4b192b9c9890a36bf1fd2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/jquery-archive-list-widget/tags/6.1.5/classes/class-jq-archive-list-datasource.php",
          "name" : "https://plugins.trac.wordpress.org/browser/jquery-archive-list-widget/tags/6.1.5/classes/class-jq-archive-list-datasource.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3341291/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3341291/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/jquery-archive-list-widget/#developers",
          "name" : "https://wordpress.org/plugins/jquery-archive-list-widget/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/72857d52-ac81-4eb2-93fa-7bb03265bccf?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/72857d52-ac81-4eb2-93fa-7bb03265bccf?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The JS Archive List plugin for WordPress is vulnerable to time-based SQL Injection via the build_sql_where() function in all versions up to, and including, 6.1.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-19T08:15Z",
    "lastModifiedDate" : "2025-08-19T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7654",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/funnel-builder/tags/3.11.0.2/woofunnels/includes/class-bwf-data-tags.php#L52",
          "name" : "https://plugins.trac.wordpress.org/browser/funnel-builder/tags/3.11.0.2/woofunnels/includes/class-bwf-data-tags.php#L52",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/3.6.3/woofunnels/includes/class-bwf-data-tags.php#L52",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/3.6.3/woofunnels/includes/class-bwf-data-tags.php#L52",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc0983d7-6c7e-41cb-8997-578d362d9c9f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc0983d7-6c7e-41cb-8997-578d362d9c9f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple FunnelKit plugins are vulnerable to Sensitive Information Exposure via the wf_get_cookie shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract sensitive data including authentication cookies of other site users, which may make privilege escalation possible.\r\n\r\nPlease note both FunnelKit – Funnel Builder for WooCommerce Checkout AND FunnelKit Automations – Email Marketing Automation and CRM for WordPress & WooCommerce are affected by this."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-19T08:15Z",
    "lastModifiedDate" : "2025-08-19T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8218",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/real-spaces-wordpress-real-estate-theme/8219779",
          "name" : "https://themeforest.net/item/real-spaces-wordpress-real-estate-theme/8219779",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d07880b-9af1-4b1e-aa70-b95ef10a6e33?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d07880b-9af1-4b1e-aa70-b95ef10a6e33?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'change_role_member' parameter in all versions up to, and including, 3.5. This is due to a lack of restriction in the profile update role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during a profile update."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-19T07:15Z",
    "lastModifiedDate" : "2025-08-19T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6758",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/real-spaces-wordpress-real-estate-theme/8219779",
          "name" : "https://themeforest.net/item/real-spaces-wordpress-real-estate-theme/8219779",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2b24858-dfcd-46f3-9552-c7acc63a1ee7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e2b24858-dfcd-46f3-9552-c7acc63a1ee7?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Real Spaces - WordPress Properties Directory Theme theme for WordPress is vulnerable to privilege escalation via the 'imic_agent_register' function in all versions up to, and including, 3.6. This is due to a lack of restriction in the registration role. This makes it possible for unauthenticated attackers to arbitrarily choose their role, including the Administrator role, during user registration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-19T07:15Z",
    "lastModifiedDate" : "2025-08-19T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38553",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/09317dfb681ac5a96fc69bea0c54441cf91b8270",
          "name" : "https://git.kernel.org/stable/c/09317dfb681ac5a96fc69bea0c54441cf91b8270",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/103c4e27ec9f5fe53022e46e976abf52c7221baf",
          "name" : "https://git.kernel.org/stable/c/103c4e27ec9f5fe53022e46e976abf52c7221baf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/250f8796006c0f2bc638ce545f601d49ae8d528b",
          "name" : "https://git.kernel.org/stable/c/250f8796006c0f2bc638ce545f601d49ae8d528b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/325f5ec67cc0a77f2d0d453445b9857f1cd06c76",
          "name" : "https://git.kernel.org/stable/c/325f5ec67cc0a77f2d0d453445b9857f1cd06c76",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/795cb393e38977aa991e70a9363da0ee734b2114",
          "name" : "https://git.kernel.org/stable/c/795cb393e38977aa991e70a9363da0ee734b2114",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ec8e0e3d7adef940cdf9475e2352c0680189d14e",
          "name" : "https://git.kernel.org/stable/c/ec8e0e3d7adef940cdf9475e2352c0680189d14e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: Restrict conditions for adding duplicating netems to qdisc tree\n\nnetem_enqueue's duplication prevention logic breaks when a netem\nresides in a qdisc tree with other netems - this can lead to a\nsoft lockup and OOM loop in netem_dequeue, as seen in [1].\nEnsure that a duplicating netem cannot exist in a tree with other\nnetems.\n\nPrevious approaches suggested in discussions in chronological order:\n\n1) Track duplication status or ttl in the sk_buff struct. Considered\ntoo specific a use case to extend such a struct, though this would\nbe a resilient fix and address other previous and potential future\nDOS bugs like the one described in loopy fun [2].\n\n2) Restrict netem_enqueue recursion depth like in act_mirred with a\nper cpu variable. However, netem_dequeue can call enqueue on its\nchild, and the depth restriction could be bypassed if the child is a\nnetem.\n\n3) Use the same approach as in 2, but add metadata in netem_skb_cb\nto handle the netem_dequeue case and track a packet's involvement\nin duplication. This is an overly complex approach, and Jamal\nnotes that the skb cb can be overwritten to circumvent this\nsafeguard.\n\n4) Prevent the addition of a netem to a qdisc tree if its ancestral\npath contains a netem. However, filters and actions can cause a\npacket to change paths when re-enqueued to the root from netem\nduplication, leading us to the current solution: prevent a\nduplicating netem from inhabiting the same tree as other netems.\n\n[1] https://lore.kernel.org/netdev/8DuRWwfqjoRDLDmBMlIfbrsZg9Gx50DHJc1ilxsEBNe2D6NMoigR_eIRIG0LOjMc3r10nUUZtArXx4oZBIdUfZQrwjcQhdinnMis_0G7VEk=@willsroot.io/\n[2] https://lwn.net/Articles/719297/"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T06:15Z",
    "lastModifiedDate" : "2025-08-19T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8357",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/media-library-assistant/tags/3.26/includes/class-mla-main.php#L924",
          "name" : "https://plugins.trac.wordpress.org/browser/media-library-assistant/tags/3.26/includes/class-mla-main.php#L924",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336915%40media-library-assistant&new=3336915%40media-library-assistant&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336915%40media-library-assistant&new=3336915%40media-library-assistant&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8726375f-de67-4c92-9cf8-1bfb7330f327?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8726375f-de67-4c92-9cf8-1bfb7330f327?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Media Library Assistant plugin for WordPress is vulnerable to arbitrary file deletion in the /wp-content/uploads directory due to insufficient file path validation and user capability checking in the _process_mla_download_file function in all versions up to, and including, 3.27. This makes it possible for authenticated attackers, with Author-level access and above, to delete arbitrary files on the server from the /wp-content/uploads/ directory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-19T05:15Z",
    "lastModifiedDate" : "2025-08-19T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5417",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:14090",
          "name" : "RHSA-2025:14090",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5417",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5417",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2369602",
          "name" : "RHBZ#2369602",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An insufficient access control vulnerability was found in the Red Hat\nDeveloper Hub rhdh/rhdh-hub-rhel9 container image. The Red Hat Developer Hub cluster admin/user, who has standard user access to the cluster, and the Red Hat Developer Hub namespace, can access the\nrhdh/rhdh-hub-rhel9 container image and modify the image's content. This issue affects the confidentiality and integrity of the data, and any changes made are not permanent, as they reset after the pod restarts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T05:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7496",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340004%40woo-smart-compare&new=3340004%40woo-smart-compare&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340004%40woo-smart-compare&new=3340004%40woo-smart-compare&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c01f7892-5ca2-4bc8-91c2-dfebb685aff8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c01f7892-5ca2-4bc8-91c2-dfebb685aff8?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPC Smart Compare for WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via DOM elements in all versions up to, and including, 6.4.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-19T04:15Z",
    "lastModifiedDate" : "2025-08-19T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57725",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57724",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57723",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57722",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57721",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57720",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57719",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57718",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57717",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-19T03:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54862",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server web portal is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54759",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server is vulnerable to stored cross-site scripting. An attacker could inject malicious HTML codes redirecting a user to a malicious webpage and stealing the user's cookie."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54156",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Sante PACS Server Web Portal sends credential information without encryption."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53948",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-415"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Sante PACS Server allows a remote attacker to crash the main thread by sending a crafted HL7 message, causing a denial-of-service condition. The application would require a manual restart and no authentication is required."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52584",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing XE files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46269",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing VC6 files. This could lead to a heap-based buffer overflow. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T22:15Z",
    "lastModifiedDate" : "2025-08-18T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9119",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320456",
          "name" : "VDB-320456 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320456",
          "name" : "VDB-320456 | Netis WF2419 Wireless Settings index.htm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628410",
          "name" : "Submit #628410 | Netis WF2419 V1.2.29433 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Netis WF2419 1.2.29433. This vulnerability affects unknown code of the file /index.htm of the component Wireless Settings Page. This manipulation of the argument SSID with the input <img/src/onerror=prompt(8)> causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T21:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53705",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing CO files. This could lead to an out-of-bounds write. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T21:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-41392",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-224-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Ashlar-Vellum Cobalt, Xenon, Argon, Lithium, and Cobalt Share versions prior to 12.6.1204.204, the affected applications lack proper validation of user-supplied data when parsing AR files. This could lead to an out-of-bounds read. An attacker could leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T21:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8098",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://iknow.lenovo.com.cn/detail/430658",
          "name" : "https://iknow.lenovo.com.cn/detail/430658",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper permission vulnerability was reported in Lenovo PC Manager that could allow a local attacker to escalate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55591",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%202.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%202.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK-A3002R v4.0.0-B20230531.1404 was discovered to contain a command injection vulnerability in the devicemac parameter in the formMapDel endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55590",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%203.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%203.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain an command injection vulnerability via the component bupload.html."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55589",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%201.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20Command%20Injection/PoC%201.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain multiple OS command injection vulnerabilities via the macstr, bandstr, and clientoff parameters at /boafrm/formMapDelDevice."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55588",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formPortFw%20PoC.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formPortFw%20PoC.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow in the fw_ip parameter at /boafrm/formPortFw. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55587",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formMapDelDevice%20PoC.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formMapDelDevice%20PoC.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow in the hostname parameter at /boafrm/formMapDelDevice. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55586",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formFilter%20PoC.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Boa%20-%20BOF/formFilter%20PoC.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain a buffer overflow in the url parameter at /boafrm/formFilter. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55585",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Eval%20Injection/PoC.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Eval%20Injection/PoC.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain an eval injection vulnerability via the eval() function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55584",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Telnet/PoC.md",
          "name" : "https://github.com/goldenGlow21/softwares_PoC/blob/main/A3002R_V4/Telnet/PoC.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK A3002R v4.0.0-B20230531.1404 was discovered to contain insecure credentials for the telnet service and root account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55213",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/openfga/openfga/commit/1a7e0e37fc4777c824b2386cac4867a66f3480b0",
          "name" : "https://github.com/openfga/openfga/commit/1a7e0e37fc4777c824b2386cac4867a66f3480b0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/openfga/openfga/security/advisories/GHSA-mgh9-4mwp-fg55",
          "name" : "https://github.com/openfga/openfga/security/advisories/GHSA-mgh9-4mwp-fg55",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenFGA is a high-performance and flexible authorization/permission engine built for developers and inspired by Google Zanzibar. OpenFGA v1.9.3 to v1.9.4 ( openfga-0.2.40 <= Helm chart <= openfga-0.2.41, v1.9.3 <= docker <= v.1.9.4) are vulnerable to improper policy enforcement when certain Check and ListObject calls are executed. This vulnerability is fixed in 1.9.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53192",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/2gj8tjl6vz949nnp3yxz3okm9xz2k7sp",
          "name" : "https://lists.apache.org/thread/2gj8tjl6vz949nnp3yxz3okm9xz2k7sp",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "** UNSUPPORTED WHEN ASSIGNED ** Improper Neutralization of Expression/Command Delimiters vulnerability in Apache Commons OGNL.\n\nThis issue affects Apache Commons OGNL: all versions.\n\n\n\nWhen using the API Ognl.getValue?, the OGNL engine parses and evaluates the provided expression with powerful capabilities, including accessing and invoking related methods,\n etc. Although OgnlRuntime attempts to restrict certain dangerous classes and methods (such as java.lang.Runtime) through a blocklist, these restrictions are not comprehensive. \nAttackers may be able to bypass the restrictions by leveraging class objects that are not covered by the blocklist and potentially achieve arbitrary code execution.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4371",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-194466",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-194466",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A potential vulnerability was reported in the Lenovo 510 FHD and Performance FHD web cameras that could allow an attacker with physical access to write arbitrary firmware updates to the device over a USB connection."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32992",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://assets.thermofisher.com/TFS-Assets/CORP/Product-Guides/Thermo_Scientific_ePort_software.pdf",
          "name" : "https://assets.thermofisher.com/TFS-Assets/CORP/Product-Guides/Thermo_Scientific_ePort_software.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.thermofisher.com/us/en/home/industrial/environmental/environmental-learning-center/environmental-resource-library/fast5-issues/iq-series-eport-versus-iport.html",
          "name" : "https://www.thermofisher.com/us/en/home/industrial/environmental/environmental-learning-center/environmental-resource-library/fast5-issues/iq-series-eport-versus-iport.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Thermo Fisher Scientific ePort through 3.0.0 has Incorrect Access Control."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T20:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43731",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43731",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43731",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.8, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allows an remote authenticated user to inject JavaScript in message board threads and categories."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T19:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7693",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1736.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1736.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists due to improper handling of malformed CIP Forward Close packets during fuzzing. The controller enters a solid red Fault LED state and becomes unresponsive. Upon power cycle, the controller will enter recoverable fault where the MS LED and Fault LED become flashing red and reports fault code?0xF015. To recover,?clear the fault."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T18:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55300",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/komari-monitor/komari/commit/d31d12e59febce100ab0285b93338f09aa5d6cb1",
          "name" : "https://github.com/komari-monitor/komari/commit/d31d12e59febce100ab0285b93338f09aa5d6cb1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/komari-monitor/komari/security/advisories/GHSA-q355-h244-969h",
          "name" : "https://github.com/komari-monitor/komari/security/advisories/GHSA-q355-h244-969h",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Komari is a lightweight, self-hosted server monitoring tool designed to provide a simple and efficient solution for monitoring server performance. Prior to 1.0.4-fix1, WebSocket upgrader has disabled origin checking, enabling Cross-Site WebSocket Hijacking (CSWSH) attacks against authenticated users. Any third party website can send requests to the terminal websocket endpoint with browser's cookies, resulting in remote code execution. This vulnerability is fixed in 1.0.4-fix1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T18:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55299",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-521"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/7ritn/VaulTLS/commit/6ac0a43a768f1753f6889ba43f914e773a4b45c0",
          "name" : "https://github.com/7ritn/VaulTLS/commit/6ac0a43a768f1753f6889ba43f914e773a4b45c0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/7ritn/VaulTLS/security/advisories/GHSA-pjfr-pj3h-cw8m",
          "name" : "https://github.com/7ritn/VaulTLS/security/advisories/GHSA-pjfr-pj3h-cw8m",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "VaulTLS is a modern solution for managing mTLS (mutual TLS) certificates. Prior to 0.9.1, user accounts created through the User web UI have an empty but not NULL password set, attackers can use this to login with an empty password. This is combined with that fact, that previously disabling the password based login only effected the frontend, but still allowed login via the API. This vulnerability is fixed in 0.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T18:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55296",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/librenms/librenms/commit/8ade3d827d317f5ac4b336617aafff865f825958",
          "name" : "https://github.com/librenms/librenms/commit/8ade3d827d317f5ac4b336617aafff865f825958",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/librenms/librenms/security/advisories/GHSA-vxq6-8cwm-wj99",
          "name" : "https://github.com/librenms/librenms/security/advisories/GHSA-vxq6-8cwm-wj99",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "librenms is a community-based GPL-licensed network monitoring system. A stored Cross-Site Scripting (XSS) vulnerability exists in LibreNMS (<= 25.6.0) in the Alert Template creation feature. This allows a user with the admin role to inject malicious JavaScript, which will be executed when the template is rendered, potentially compromising other admin accounts. This vulnerability is fixed in 25.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T18:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55293",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/meshtastic/firmware/commit/cf7f0f9d0895602df3453a4f5cfea843f4e09744",
          "name" : "https://github.com/meshtastic/firmware/commit/cf7f0f9d0895602df3453a4f5cfea843f4e09744",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/meshtastic/firmware/pull/6372",
          "name" : "https://github.com/meshtastic/firmware/pull/6372",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/meshtastic/firmware/security/advisories/GHSA-95pq-gj5v-4fg2",
          "name" : "https://github.com/meshtastic/firmware/security/advisories/GHSA-95pq-gj5v-4fg2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Meshtastic is an open source mesh networking solution. Prior to v2.6.3, an attacker can send NodeInfo with a empty publicKey first, then overwrite it with a new key. First sending a empty key bypasses 'if (p.public_key.size > 0) {', clearing the existing publicKey (and resetting the size to 0) for a known node. Then a new key bypasses 'if (info->user.public_key.size > 0) {', and this malicious key is stored in NodeDB. This vulnerability is fixed in 2.6.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T18:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55291",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-80"
          }, {
            "lang" : "en",
            "value" : "CWE-87"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaarli/Shaarli/commit/66faa61335a6e72184be64092ff1242ffa4fe5b6",
          "name" : "https://github.com/shaarli/Shaarli/commit/66faa61335a6e72184be64092ff1242ffa4fe5b6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/shaarli/Shaarli/security/advisories/GHSA-7w7w-pw4j-265h",
          "name" : "https://github.com/shaarli/Shaarli/security/advisories/GHSA-7w7w-pw4j-265h",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Shaarli is a minimalist bookmark manager and link sharing service. Prior to 0.15.0, the input string in the cloud tag page is not properly sanitized. This allows the </title> tag to be prematurely closed, leading to a reflected Cross-Site Scripting (XSS) vulnerability. This vulnerability is fixed in 0.15.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55288",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MGeurts/genealogy/commit/1683b3cbea5e52c99291fa231b7bc8c33f33c33f",
          "name" : "https://github.com/MGeurts/genealogy/commit/1683b3cbea5e52c99291fa231b7bc8c33f33c33f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MGeurts/genealogy/security/advisories/GHSA-3h8x-g9xj-rhwg",
          "name" : "https://github.com/MGeurts/genealogy/security/advisories/GHSA-3h8x-g9xj-rhwg",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Genealogy is a family tree PHP application. Prior to 4.4.0, Authenticated Reflected Cross-Site Scripting (XSS) vulnerability was identified in the Genealogy application. Authenticated attackers could run arbitrary JavaScript in another user’s session, leading to session hijacking, data theft, and UI manipulation. This vulnerability is fixed in 4.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55287",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MGeurts/genealogy/commit/1683b3cbea5e52c99291fa231b7bc8c33f33c33f",
          "name" : "https://github.com/MGeurts/genealogy/commit/1683b3cbea5e52c99291fa231b7bc8c33f33c33f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MGeurts/genealogy/security/advisories/GHSA-j457-9m86-6q5r",
          "name" : "https://github.com/MGeurts/genealogy/security/advisories/GHSA-j457-9m86-6q5r",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Genealogy is a family tree PHP application. Prior to 4.4.0, Authenticated Stored Cross-Site Scripting (XSS) vulnerability was identified in the Genealogy application. Authenticated attackers could run arbitrary JavaScript in another user’s session, leading to session hijacking, data theft, and UI manipulation. This vulnerability is fixed in 4.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55283",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aiven/aiven-db-migrate/commit/36f6c7f7d06216975f625da0a1cb514253c4b3df",
          "name" : "https://github.com/aiven/aiven-db-migrate/commit/36f6c7f7d06216975f625da0a1cb514253c4b3df",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-wqhc-grmj-fjvg",
          "name" : "https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-wqhc-grmj-fjvg",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "aiven-db-migrate is an Aiven database migration tool. Prior to 1.0.7, there is a privilege escalation vulnerability that allows elevation to superuser inside PostgreSQL databases during a migration from an untrusted source server. The vulnerability stems from psql executing commands embedded in a dump from the source server. This vulnerability is fixed in 1.0.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55282",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aiven/aiven-db-migrate/commit/39517dc55720055d93262033b142a365f5bf92c5",
          "name" : "https://github.com/aiven/aiven-db-migrate/commit/39517dc55720055d93262033b142a365f5bf92c5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-hmvf-93r4-36f9",
          "name" : "https://github.com/aiven/aiven-db-migrate/security/advisories/GHSA-hmvf-93r4-36f9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "aiven-db-migrate is an Aiven database migration tool. Prior to 1.0.7, there is a privilege escalation vulnerability that allows a user to elevate to superuser inside PostgreSQL databases during a migration from an untrusted source server. By exploiting a lack of search_path restriction, an attacker can override pg_catalog and execute untrusted operators as a superuser. This vulnerability is fixed in 1.0.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55214",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/copier-org/copier/commit/fdbc0167cc22780b497e4db176feaf6f024757d6",
          "name" : "https://github.com/copier-org/copier/commit/fdbc0167cc22780b497e4db176feaf6f024757d6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/copier-org/copier/security/advisories/GHSA-p7q8-grrj-3m8w",
          "name" : "https://github.com/copier-org/copier/security/advisories/GHSA-p7q8-grrj-3m8w",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Copier library and CLI app for rendering project templates. From 7.1.0 to before 9.9.1, Copier suggests that it's safe to generate a project from a safe template, i.e. one that doesn't use unsafe features like custom Jinja extensions which would require passing the --UNSAFE,--trust flag. As it turns out, a safe template can currently write files outside the destination path where a project shall be generated or updated. This is possible when rendering a generated directory structure whose rendered path is either a relative parent path or an absolute path. Constructing such paths is possible using Copier's builtin pathjoin Jinja filter and its builtin _copier_conf.sep variable, which is the platform-native path separator. This way, a malicious template author can create a template that overwrites arbitrary files (according to the user's write permissions), e.g., to cause havoc. This vulnerability is fixed in 9.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55205",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/projectcapsule/capsule/commit/e1f47feade6e1695b2204407607d07c3b3994f6e",
          "name" : "https://github.com/projectcapsule/capsule/commit/e1f47feade6e1695b2204407607d07c3b3994f6e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/projectcapsule/capsule/security/advisories/GHSA-fcpm-6mxq-m5vv",
          "name" : "https://github.com/projectcapsule/capsule/security/advisories/GHSA-fcpm-6mxq-m5vv",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Capsule is a multi-tenancy and policy-based framework for Kubernetes. A namespace label injection vulnerability in Capsule v0.10.3 and earlier allows authenticated tenant users to inject arbitrary labels into system namespaces (kube-system, default, capsule-system), bypassing multi-tenant isolation and potentially accessing cross-tenant resources through TenantResource selectors. This vulnerability enables privilege escalation and violates the fundamental security boundaries that Capsule is designed to enforce. This vulnerability is fixed in 0.10.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55201",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/copier-org/copier/commit/3feea3b3ff3c20d80cbb16a2f3b9567ffc5606d1",
          "name" : "https://github.com/copier-org/copier/commit/3feea3b3ff3c20d80cbb16a2f3b9567ffc5606d1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/copier-org/copier/security/advisories/GHSA-3xw7-v6cj-5q8h",
          "name" : "https://github.com/copier-org/copier/security/advisories/GHSA-3xw7-v6cj-5q8h",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Copier library and CLI app for rendering project templates. Prior to 9.9.1, a safe template can currently read and write arbitrary files because Copier exposes a few pathlib.Path objects in the Jinja context which have unconstrained I/O methods. This effectively renders the security model w.r.t. filesystem access useless. This vulnerability is fixed in 9.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54234",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/coldfusion/apsb25-52.html",
          "name" : "https://helpx.adobe.com/security/products/coldfusion/apsb25-52.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ColdFusion versions 2025.1, 2023.13, 2021.19 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to limited file system read. A high-privilege authenticated attacker can force the application to make arbitrary requests via injection of arbitrary URLs. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.2,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3639",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3639",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-3639",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Liferay Portal 7.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1 through 2025.Q1.6, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.15, 7.4 GA through update 92 and 7.3 GA through update 36 allows unauthenticated users with valid credentials to bypass the login process by changing the POST method to GET, once the site has MFA enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T17:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54421",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NamelessMC/Nameless/commit/56d35cff9ee944c061791ef478cabd2bed0223c4",
          "name" : "https://github.com/NamelessMC/Nameless/commit/56d35cff9ee944c061791ef478cabd2bed0223c4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-f5rm-w4mx-q7rx",
          "name" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-f5rm-w4mx-q7rx",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Cross-site scripting (XSS) vulnerability in NamelessMC before 2.2.4 allows remote authenticated attackers to inject arbitrary web script or HTML via the default_keywords crafted parameter. This vulnerability is fixed in 2.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T16:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54118",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NamelessMC/Nameless/commit/3b94eb594dcbb1abc5524e41a0631df3ac95de8f",
          "name" : "https://github.com/NamelessMC/Nameless/commit/3b94eb594dcbb1abc5524e41a0631df3ac95de8f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-cj37-8jqc-hv2w",
          "name" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-cj37-8jqc-hv2w",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Sensitive information disclosure in NamelessMC before 2.2.4 allows unauthenticated remote attacker to gain sensitive information such as absolute path of the source code via list parameter. This vulnerability is fixed in 2.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T16:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54117",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NamelessMC/Nameless/commit/0e77706b2966dd9f2e30502126d6581ecc001f09",
          "name" : "https://github.com/NamelessMC/Nameless/commit/0e77706b2966dd9f2e30502126d6581ecc001f09",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-gp3j-j84w-vqxx",
          "name" : "https://github.com/NamelessMC/Nameless/security/advisories/GHSA-gp3j-j84w-vqxx",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NamelessMC is a free, easy to use & powerful website software for Minecraft servers. Cross-site scripting (XSS) vulnerability in NamelessMC before 2.2.3 allows remote authenticated attackers to inject arbitrary web script or HTML via the dashboard text editor component. This vulnerability is fixed in 2.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T16:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4962",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lunary-ai/lunary/commit/e977d06f18a615963ffbe07e5bdff70218c29907",
          "name" : "https://github.com/lunary-ai/lunary/commit/e977d06f18a615963ffbe07e5bdff70218c29907",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://huntr.com/bounties/137a0aef-e243-49d4-832f-8e56056cba1a",
          "name" : "https://huntr.com/bounties/137a0aef-e243-49d4-832f-8e56056cba1a",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Insecure Direct Object Reference (IDOR) vulnerability was identified in the `POST /v1/templates` endpoint of the Lunary API, affecting versions up to 0.8.8. This vulnerability allows authenticated users to create templates in another user's project by altering the `projectId` query parameter. The root cause of this issue is the absence of server-side validation to ensure that the authenticated user owns the specified `projectId`. The vulnerability has been addressed in version 1.9.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43732",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43732",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43732",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.10, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.17 and 7.4 GA through update 92 is vulnerable to Insecure Direct Object Reference (IDOR) in the groupId parameter of the _com_liferay_roles_selector_web_portlet_RolesSelectorPortlet_groupId. When an organization administrator modifies this parameter id value, they can gain unauthorized access to user lists from other organizations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36120",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7240796",
          "name" : "https://www.ibm.com/support/pages/node/7240796",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Storage Virtualize 8.4, 8.5, 8.6, and 8.7 could allow an authenticated user to escalate their privileges in an SSH session due to incorrect authorization checks to access resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33100",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 \n\ncontains hard-coded credentials, such as a password or cryptographic key, which it uses for its own inbound authentication, outbound communication to external components, or encryption of internal data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33090",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1333"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to cause a denial of service using a specially crafted regular expression that would cause excessive resource consumption."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27909",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-942"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 uses cross-origin resource sharing (CORS) which could allow an attacker to carry out privileged actions as the domain name is not being limited to only trusted domains."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1759",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-244"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to obtain sensitive information from allocated memory due to improper clearing of heap memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-49827",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-213"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 is vulnerable to excessive data exposure, allowing attackers to access sensitive information without proper filtering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43733",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43733",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43733",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.7 allows a remote authenticated attacker to inject JavaScript code via the content page's name field. This malicious payload is then reflected and executed within the user's browser when viewing the \"document View Usages\" page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T13:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47206",
        "ASSIGNER" : "security@qnap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.qnap.com/en/security-advisory/qsa-25-31",
          "name" : "https://www.qnap.com/en/security-advisory/qsa-25-31",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An out-of-bounds write vulnerability has been reported to affect File Station 5. If a remote attacker gains a user account, they can then exploit the vulnerability to modify or corrupt memory.\n\nWe have already fixed the vulnerability in the following version:\nFile Station 5 5.5.6.4933 and later"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T09:15Z",
    "lastModifiedDate" : "2025-08-18T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-41242",
        "ASSIGNER" : "security@vmware.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://spring.io/security/cve-2025-41242",
          "name" : "http://spring.io/security/cve-2025-41242",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Spring Framework MVC applications can be vulnerable to a “Path Traversal Vulnerability” when deployed on a non-compliant Servlet container.\n\nAn application can be vulnerable when all the following are true:\n\n  *  the application is deployed as a WAR or with an embedded Servlet container\n  *  the Servlet container  does not reject suspicious sequences https://jakarta.ee/specifications/servlet/6.1/jakarta-servlet-spec-6.1.html#uri-path-canonicalization \n  *  the application  serves static resources https://docs.spring.io/spring-framework/reference/web/webmvc/mvc-config/static-resources.html#page-title  with Spring resource handling\n\n\nWe have verified that applications deployed on Apache Tomcat or Eclipse Jetty are not vulnerable, as long as default security features are not disabled in the configuration. Because we cannot check exploits against all Servlet containers and configuration variants, we strongly recommend upgrading your application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T09:15Z",
    "lastModifiedDate" : "2025-08-18T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5296",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-224-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-224-03.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-224-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-224-03.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-59: Improper Link Resolution Before File Access ('Link Following') vulnerability exists that could cause \narbitrary data to be written to protected locations, potentially leading to escalation of privilege, arbitrary file \ncorruption, exposure of application and system information or persistent denial of service when a low-privileged \nattacker tampers with the installation folder."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T08:15Z",
    "lastModifiedDate" : "2025-08-18T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6625",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-224-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-224-05.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-224-05&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-224-05.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-20: Improper Input Validation vulnerability exists that could cause a Denial Of Service when specific\ncrafted FTP command is sent to the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T07:15Z",
    "lastModifiedDate" : "2025-08-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57703",
        "ASSIGNER" : "PSIRT@deltaww.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "name" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DIAEnergie - Reflected Cross-site Scripting"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T07:15Z",
    "lastModifiedDate" : "2025-08-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57702",
        "ASSIGNER" : "PSIRT@deltaww.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "name" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DIAEnergie - Reflected Cross-site Scripting"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T07:15Z",
    "lastModifiedDate" : "2025-08-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57701",
        "ASSIGNER" : "PSIRT@deltaww.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "name" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DIAEnergie - Reflected Cross-site Scripting"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T07:15Z",
    "lastModifiedDate" : "2025-08-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-57700",
        "ASSIGNER" : "PSIRT@deltaww.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "name" : "https://filecenter.deltaww.com/news/download/doc/Delta-PCSA-2025-00012_DIAEnergie%20Cross-Site%20Scripting%20Vulnerabilities.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DIAEnergie - Stored Cross-site Scripting"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T07:15Z",
    "lastModifiedDate" : "2025-08-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9109",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-203"
          }, {
            "lang" : "en",
            "value" : "CWE-204"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320431",
          "name" : "VDB-320431 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320431",
          "name" : "VDB-320431 | Portabilis i-Diario Password Recovery Endpoint email observable response discrepancy",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627926",
          "name" : "Submit #627926 | i-diario i-diario Password Reset Functionality 2.9 i-diario Password Reset Functionality",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in Portabilis i-Diario up to 1.5.0. Affected by this vulnerability is an unknown functionality of the file /password/email of the component Password Recovery Endpoint. The manipulation results in observable response discrepancy. It is possible to launch the attack remotely. This attack is characterized by high complexity. The exploitation appears to be difficult. The exploit has been released to the public and may be exploited."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T06:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9108",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320430",
          "name" : "VDB-320430 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320430",
          "name" : "VDB-320430 | Portabilis i-Diario Login Page ui layer",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627923",
          "name" : "Submit #627923 | i-diario i-diario login system 2.9 Clickjacking",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Affected is an unknown function of the component Login Page. The manipulation leads to improper restriction of rendered ui layers. It is possible to launch the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T06:15Z",
    "lastModifiedDate" : "2025-08-18T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9107",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Reflected%20XSS%20endpoint%20search_autocomplete%20parameter%20q.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320429",
          "name" : "VDB-320429 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320429",
          "name" : "VDB-320429 | Portabilis i-Diario search_autocomplete cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627568",
          "name" : "Submit #627568 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Reflected",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9107.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627568",
          "name" : "https://vuldb.com/?submit.627568",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Portabilis i-Diario up to 1.5.0. This impacts an unknown function of the file /alunos/search_autocomplete. Executing manipulation of the argument q can lead to cross site scripting. The attack may be performed from a remote location. The exploit has been publicly disclosed and may be utilized. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T05:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9106",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320428",
          "name" : "VDB-320428 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320428",
          "name" : "VDB-320428 | Portabilis i-Diario Informações Adicionais /planos-de-ensino-por-disciplina cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627567",
          "name" : "Submit #627567 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9106%20.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627567",
          "name" : "https://vuldb.com/?submit.627567",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Diario up to 1.5.0. This affects an unknown function of the file /planos-de-ensino-por-disciplina/ of the component Informações Adicionais Page. Performing manipulation of the argument Parecer/Conteúdos/Objetivos results in cross site scripting. The attack is possible to be carried out remotely. The exploit has been made public and could be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T05:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9105",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md#poc",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-ensino-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320427",
          "name" : "VDB-320427 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320427",
          "name" : "VDB-320427 | Portabilis i-Diario Informações Adicionais /planos-de-ensino-por-areas-de-conhecimento cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627566",
          "name" : "Submit #627566 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9105.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627566",
          "name" : "https://vuldb.com/?submit.627566",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Portabilis i-Diario up to 1.5.0. The impacted element is an unknown function of the file /planos-de-ensino-por-areas-de-conhecimento/ of the component Informações Adicionais Page. Such manipulation of the argument Parecer/Conteúdos/Objetivos leads to cross site scripting. The attack can be executed remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T04:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9104",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aulas-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aulas-por-disciplina.(ID)%20in%20multiples%20parameters.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320426",
          "name" : "VDB-320426 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320426",
          "name" : "VDB-320426 | Portabilis i-Diario Informações Adicionais /planos-de-aulas-por-disciplina cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627565",
          "name" : "Submit #627565 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-9104.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627565",
          "name" : "https://vuldb.com/?submit.627565",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in Portabilis i-Diario up to 1.5.0. The affected element is an unknown function of the file /planos-de-aulas-por-disciplina/ of the component Informações Adicionais Page. This manipulation of the argument Parecer/Objeto de Conhecimento/Habilidades causes cross site scripting. Remote exploitation of the attack is possible. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T04:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9103",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hkohi.ca/vulnerability/28",
          "name" : "https://hkohi.ca/vulnerability/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320425",
          "name" : "VDB-320425 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320425",
          "name" : "VDB-320425 | ZenCart CKEditor cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/0xHamy/b2674eeffd1f73af96d29f152c47bcbd",
          "name" : "https://gist.github.com/0xHamy/b2674eeffd1f73af96d29f152c47bcbd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628298",
          "name" : "Submit #628298 | Zen Ventures, LLC Zen-Cart 2.1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://hkohi.ca/vulnerability/28",
          "name" : "https://hkohi.ca/vulnerability/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628298",
          "name" : "https://vuldb.com/?submit.628298",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in ZenCart 2.1.0. Affected by this vulnerability is an unknown functionality of the component CKEditor. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor declares this as \"intended behavior, allowed for authorized administrators\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T04:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9102",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320424",
          "name" : "VDB-320424 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320424",
          "name" : "VDB-320424 | 1&1 Mail & Media mail.com App com.mail.mobile.android.mail AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628264",
          "name" : "Submit #628264 | 1&1 Mail & Media Inc mail.com(com.mail.mobile.android.mail) 8.8.0 Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.mail.mobile.android.mail.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security vulnerability has been detected in 1&1 Mail & Media mail.com App 8.8.0 on Android. Affected is an unknown function of the file AndroidManifest.xml of the component com.mail.mobile.android.mail. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T03:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9101",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/147#issue-3265306297",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/147#issue-3265306297",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320423",
          "name" : "VDB-320423 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320423",
          "name" : "VDB-320423 | zhenfeng13 My-Blog Tag save cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628095",
          "name" : "Submit #628095 | ZHENFENG13 https://github.com/ZHENFENG13/My-Blog  <=1.0.0 Stored XSS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/147",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/147",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/147#issue-3265306297",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/147#issue-3265306297",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/147",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/147",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A weakness has been identified in zhenfeng13 My-Blog up to 1.0.0. This issue affects some unknown processing of the file /admin/tags/save of the component Tag Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T03:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9100",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/149#issue-3265307853",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/149#issue-3265307853",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320422",
          "name" : "VDB-320422 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320422",
          "name" : "VDB-320422 | zhenfeng13 My-Blog Frontend Blog Article Comment comment authentication replay",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628097",
          "name" : "Submit #628097 | ZHENFENG13 https://github.com/ZHENFENG13/My-Blog  <=1.0.0 CAPTCHA reuse vulerability",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/149",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/149",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/149#issue-3265307853",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/149#issue-3265307853",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/149",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/149",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in zhenfeng13 My-Blog 1.0.0. This vulnerability affects unknown code of the file /blog/comment of the component Frontend Blog Article Comment Handler. The manipulation leads to authentication bypass by capture-replay. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T02:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9099",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320421",
          "name" : "VDB-320421 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320421",
          "name" : "VDB-320421 | Acrel Environmental Monitoring Cloud Platform UploadNewsImg unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628090",
          "name" : "Submit #628090 | https://ems.acrel.cn/ Environmental Monitoring Cloud Platform 1 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.notion.so/upload-23e9bb66b0a58088a9b4fcaea56a857f?source=copy_link",
          "name" : "https://www.notion.so/upload-23e9bb66b0a58088a9b4fcaea56a857f?source=copy_link",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Acrel Environmental Monitoring Cloud Platform up to 20250804. This affects an unknown part of the file /NewsManage/UploadNewsImg. The manipulation of the argument File leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-18T01:15Z",
    "lastModifiedDate" : "2025-08-18T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9098",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-926"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.elseplus.filerecovery.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320420",
          "name" : "VDB-320420 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320420",
          "name" : "VDB-320420 | Elseplus File Recovery App AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627902",
          "name" : "Submit #627902 | elseplus lib File Recovery(com.elseplus.filerecovery) 4.4.21 Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Elseplus File Recovery App 4.4.21 on Android. Affected by this issue is some unknown functionality of the file AndroidManifest.xml. The manipulation leads to improper export of android application components. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-18T01:15Z",
    "lastModifiedDate" : "2025-08-18T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31715",
        "ASSIGNER" : "security@unisoc.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In vowifi service, there is a possible command injection due to improper input validation. This could lead to remote escalation of privilege with no additional execution privileges needed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T01:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31714",
        "ASSIGNER" : "security@unisoc.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Developer Tools, there is a possible missing verification incorrect input. This could lead to local escalation of privilege with no additional execution privileges needed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T01:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31713",
        "ASSIGNER" : "security@unisoc.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "name" : "https://www.unisoc.com/en_us/secy/announcementDetail/1944933773300793346",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In engineer mode service, there is a possible command injection due to improper input validation. This could lead to local escalation of privilege with no additional execution privileges needed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-18T01:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9097",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-926"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.cic_prod.bad.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320419",
          "name" : "VDB-320419 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320419",
          "name" : "VDB-320419 | Euro Information CIC banque et compte en ligne App com.cic_prod.bad AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627899",
          "name" : "Submit #627899 | Euro Information CIC banque(com.cic_prod.bad) 12.56.0 Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Euro Information CIC banque et compte en ligne App 12.56.0 on Android. Affected by this vulnerability is an unknown functionality of the file AndroidManifest.xml of the component com.cic_prod.bad. The manipulation leads to improper export of android application components. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-18T00:15Z",
    "lastModifiedDate" : "2025-08-18T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9096",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/freshfish-hust/my-cves/issues/6",
          "name" : "https://github.com/freshfish-hust/my-cves/issues/6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/freshfish-hust/my-cves/issues/6#issue-3287078206",
          "name" : "https://github.com/freshfish-hust/my-cves/issues/6#issue-3287078206",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320418",
          "name" : "VDB-320418 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320418",
          "name" : "VDB-320418 | ExpressGateway express-gateway REST Endpoint apps.js cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627833",
          "name" : "Submit #627833 | GitHub Web Application Express Gateway 1.16.10 and possibly earlier Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in ExpressGateway express-gateway up to 1.16.10. Affected is an unknown function in the library lib/rest/routes/apps.js of the component REST Endpoint. The manipulation leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-18T00:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9095",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/freshfish-hust/my-cves/issues/5",
          "name" : "https://github.com/freshfish-hust/my-cves/issues/5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/freshfish-hust/my-cves/issues/5#issue-3286622393",
          "name" : "https://github.com/freshfish-hust/my-cves/issues/5#issue-3286622393",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320417",
          "name" : "VDB-320417 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320417",
          "name" : "VDB-320417 | ExpressGateway express-gateway REST Endpoint users.js cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627709",
          "name" : "Submit #627709 | GitHub Web Application Express Gateway 1.16.10 and possibly earlier Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in ExpressGateway express-gateway up to 1.16.10. This issue affects some unknown processing in the library lib/rest/routes/users.js of the component REST Endpoint. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-17T23:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9094",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-791"
          }, {
            "lang" : "en",
            "value" : "CWE-1336"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1cZy-rfQXsF58kJIVs4UXj7usXJuhjZjA/view",
          "name" : "https://drive.google.com/file/d/1cZy-rfQXsF58kJIVs4UXj7usXJuhjZjA/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320416",
          "name" : "VDB-320416 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320416",
          "name" : "VDB-320416 | ThingsBoard Add Gateway special elements used in a template engine",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626292",
          "name" : "Submit #626292 | ThingsBoard  ThingsBoard IoT Platform 4.1.0 Stored Client-Side Template Injection (CSTI)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in ThingsBoard 4.1. This vulnerability affects unknown code of the component Add Gateway Handler. The manipulation leads to improper neutralization of special elements used in a template engine. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor replies, that \"[t]he fix will come within upcoming release (v4.2) and will be inherited by maintenance releases of LTS versions (starting 4.0).\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-17T23:15Z",
    "lastModifiedDate" : "2025-08-17T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7342",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kubernetes/kubernetes/issues/133115",
          "name" : "https://github.com/kubernetes/kubernetes/issues/133115",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://groups.google.com/g/kubernetes-security-announce/c/tuEsLUQu_PA",
          "name" : "https://groups.google.com/g/kubernetes-security-announce/c/tuEsLUQu_PA",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was discovered in the Kubernetes Image Builder where default credentials are enabled during the Windows image build process when using the Nutanix or VMware OVA providers. These credentials, which allow root access, are disabled at the conclusion of the build. Kubernetes clusters are only affected if their nodes use VM images created via the Image Builder project and the vulnerability was exploited during the build process, which requires an attacker to access the build VM and modify the image while the build is in progress."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-17T23:15Z",
    "lastModifiedDate" : "2025-08-20T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9093",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md#steps-to-reproduce",
          "name" : "https://github.com/KMov-g/androidapps/blob/main/com.buzzfeed.android.md#steps-to-reproduce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320415",
          "name" : "VDB-320415 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320415",
          "name" : "VDB-320415 | BuzzFeed App com.buzzfeed.android AndroidManifest.xml improper export of android application components",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623584",
          "name" : "Submit #623584 | BuzzFeed BuzzFeed(com.buzzfeed.android) 2024.9 Task Hijacking",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security vulnerability has been detected in BuzzFeed App 2024.9 on Android. This affects an unknown part of the file AndroidManifest.xml of the component com.buzzfeed.android. The manipulation leads to improper export of android application components. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-17T22:15Z",
    "lastModifiedDate" : "2025-08-18T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9091",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/hardcoded%20password/readme.md#description",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/hardcoded%20password/readme.md",
          "name" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/hardcoded%20password/readme.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320359",
          "name" : "VDB-320359 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320359",
          "name" : "VDB-320359 | Tenda AC20 shadow hard-coded credentials",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632268",
          "name" : "Submit #632268 | Tenda AC20 V16.03.08.12 Hard-coded Credentials",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security flaw has been discovered in Tenda AC20 16.03.08.12. Affected by this vulnerability is an unknown functionality of the file /etc_ro/shadow. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-17T03:15Z",
    "lastModifiedDate" : "2025-08-18T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9090",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md#poc-exploit-steps",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/telnet/readme.md#poc-exploit-steps",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320358",
          "name" : "VDB-320358 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320358",
          "name" : "VDB-320358 | Tenda AC20 Telnet Service telnet websFormDefine command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632232",
          "name" : "Submit #632232 | Tenda AC20 V16.03.08.12 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda AC20 16.03.08.12. Affected is the function websFormDefine of the file /goform/telnet of the component Telnet Service. The manipulation leads to command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-17T03:15Z",
    "lastModifiedDate" : "2025-08-17T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9089",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md#poc-python-exploit-script",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/fromSetIpMacBind/readme.md#poc-python-exploit-script",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320357",
          "name" : "VDB-320357 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320357",
          "name" : "VDB-320357 | Tenda AC20 SetIpMacBind sub_48E628 stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632039",
          "name" : "Submit #632039 | Tenda AC20 V16.03.08.12 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Tenda AC20 16.03.08.12. This issue affects the function sub_48E628 of the file /goform/SetIpMacBind. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-17T00:15Z",
    "lastModifiedDate" : "2025-08-17T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9088",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer",
          "name" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer#poc-python-exploit-script",
          "name" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetVirtualSer#poc-python-exploit-script",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320356",
          "name" : "VDB-320356 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320356",
          "name" : "VDB-320356 | Tenda AC20 formSetVirtualSer save_virtualser_data stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632038",
          "name" : "Submit #632038 | Tenda AC20 V16.03.08.12 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Tenda AC20 16.03.08.12. This vulnerability affects the function save_virtualser_data of the file /goform/formSetVirtualSer. The manipulation of the argument list leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T23:15Z",
    "lastModifiedDate" : "2025-08-16T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9087",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand",
          "name" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand#poc-python-exploit-script",
          "name" : "https://github.com/ZZ2266/.github.io/tree/main/AC20/formSetQosBand#poc-python-exploit-script",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320355",
          "name" : "VDB-320355 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320355",
          "name" : "VDB-320355 | Tenda AC20 SetNetControlList Endpoint set_qosMib_list stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632037",
          "name" : "Submit #632037 | Tenda AC20 V16.03.08.12 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Tenda AC20 16.03.08.12. This affects the function set_qosMib_list of the file /goform/SetNetControlList of the component SetNetControlList Endpoint. The manipulation of the argument list leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T23:15Z",
    "lastModifiedDate" : "2025-08-16T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-4515",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/595679098bdcdbfbba91ebe07a2f7f208df93870",
          "name" : "https://git.kernel.org/stable/c/595679098bdcdbfbba91ebe07a2f7f208df93870",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5aa4fda5aa9c2a5a7bac67b4a12b089ab81fee3c",
          "name" : "https://git.kernel.org/stable/c/5aa4fda5aa9c2a5a7bac67b4a12b089ab81fee3c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c6bef3bc30fd4a175aef846b7d928a6c40d091cd",
          "name" : "https://git.kernel.org/stable/c/c6bef3bc30fd4a175aef846b7d928a6c40d091cd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ff7236b66d69582f90cf5616e63cfc3dc18142bb",
          "name" : "https://git.kernel.org/stable/c/ff7236b66d69582f90cf5616e63cfc3dc18142bb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate command request size\n\nIn commit 2b9b8f3b68ed (\"ksmbd: validate command payload size\"), except\nfor SMB2_OPLOCK_BREAK_HE command, the request size of other commands\nis not checked, it's not expected. Fix it by add check for request\nsize of other commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-16T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-4130",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/4bf629262f9118ee91b1c3a518ebf2b3bcb22180",
          "name" : "https://git.kernel.org/stable/c/4bf629262f9118ee91b1c3a518ebf2b3bcb22180",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/79ed288cef201f1f212dfb934bcaac75572fb8f6",
          "name" : "https://git.kernel.org/stable/c/79ed288cef201f1f212dfb934bcaac75572fb8f6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/aeb974907642be095e38ecb1a400ca583958b2b0",
          "name" : "https://git.kernel.org/stable/c/aeb974907642be095e38ecb1a400ca583958b2b0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f339d76a3a972601d0738b881b099d49ebbdc3a2",
          "name" : "https://git.kernel.org/stable/c/f339d76a3a972601d0738b881b099d49ebbdc3a2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix wrong next length validation of ea buffer in smb2_set_ea()\n\nThere are multiple smb2_ea_info buffers in FILE_FULL_EA_INFORMATION request\nfrom client. ksmbd find next smb2_ea_info using ->NextEntryOffset of\ncurrent smb2_ea_info. ksmbd need to validate buffer length Before\naccessing the next ea. ksmbd should check buffer length using buf_len,\nnot next variable. next is the start offset of current ea that got from\nprevious ea."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-3867",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/2ba03cecb12ac7ac9e0170e251543c56832d9959",
          "name" : "https://git.kernel.org/stable/c/2ba03cecb12ac7ac9e0170e251543c56832d9959",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/676392184785ace61e939831e7ca44a03d438c3b",
          "name" : "https://git.kernel.org/stable/c/676392184785ace61e939831e7ca44a03d438c3b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/98422bdd4cb3ca4d08844046f6507d7ec2c2b8d8",
          "name" : "https://git.kernel.org/stable/c/98422bdd4cb3ca4d08844046f6507d7ec2c2b8d8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ef572ffa8eb44111eed2925fbb2adca78bdcbf61",
          "name" : "https://git.kernel.org/stable/c/ef572ffa8eb44111eed2925fbb2adca78bdcbf61",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out of bounds read in smb2_sess_setup\n\nksmbd does not consider the case of that smb2 session setup is\nin compound request. If this is the second payload of the compound,\nOOB read issue occurs while processing the first payload in\nthe smb2_sess_setup()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-3866",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5005bcb4219156f1bf7587b185080ec1da08518e",
          "name" : "https://git.kernel.org/stable/c/5005bcb4219156f1bf7587b185080ec1da08518e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/854156d12caa9d36de1cf5f084591c7686cc8a9d",
          "name" : "https://git.kernel.org/stable/c/854156d12caa9d36de1cf5f084591c7686cc8a9d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d1066c1b3663401cd23c0d6e60cdae750ce00c0f",
          "name" : "https://git.kernel.org/stable/c/d1066c1b3663401cd23c0d6e60cdae750ce00c0f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/eb947403518ea3d93f6d89264bb1f5416bb0c7d0",
          "name" : "https://git.kernel.org/stable/c/eb947403518ea3d93f6d89264bb1f5416bb0c7d0",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: validate session id and tree id in the compound request\n\nThis patch validate session id and tree id in compound request.\nIf first operation in the compound is SMB2 ECHO request, ksmbd bypass\nsession and tree validation. So work->sess and work->tcon could be NULL.\nIf secound request in the compound access work->sess or tcon, It cause\nNULL pointer dereferecing error."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-3865",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3813eee5154d6a4c5875cb4444cb2b63bac8947f",
          "name" : "https://git.kernel.org/stable/c/3813eee5154d6a4c5875cb4444cb2b63bac8947f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/58a9c41064df27632e780c5a3ae3e0e4284957d1",
          "name" : "https://git.kernel.org/stable/c/58a9c41064df27632e780c5a3ae3e0e4284957d1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5fe7f7b78290638806211046a99f031ff26164e1",
          "name" : "https://git.kernel.org/stable/c/5fe7f7b78290638806211046a99f031ff26164e1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c86211159bc3178b891e0d60e586a32c7b6a231b",
          "name" : "https://git.kernel.org/stable/c/c86211159bc3178b891e0d60e586a32c7b6a231b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: fix out-of-bound read in smb2_write\n\nksmbd_smb2_check_message doesn't validate hdr->NextCommand. If\n->NextCommand is bigger than Offset + Length of smb2 write, It will\nallow oversized smb2 write length. It will cause OOB read in smb2_write."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-32249",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/088131b7b01099720a528a72005ff17868705d40",
          "name" : "https://git.kernel.org/stable/c/088131b7b01099720a528a72005ff17868705d40",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1f0490586544455e5be698be2e6c30077b4ec461",
          "name" : "https://git.kernel.org/stable/c/1f0490586544455e5be698be2e6c30077b4ec461",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3353ab2df5f68dab7da8d5ebb427a2d265a1f2b2",
          "name" : "https://git.kernel.org/stable/c/3353ab2df5f68dab7da8d5ebb427a2d265a1f2b2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4a98e859c4673013385a54084e0cd865695ca072",
          "name" : "https://git.kernel.org/stable/c/4a98e859c4673013385a54084e0cd865695ca072",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ed76d3a8910be06cd4e4ba63bf6075bf903945a1",
          "name" : "https://git.kernel.org/stable/c/ed76d3a8910be06cd4e4ba63bf6075bf903945a1",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: not allow guest user on multichannel\n\nThis patch return STATUS_NOT_SUPPORTED if binding session is guest."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-16T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-32246",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5a7090ccc242ab009ee7769e9d7fad6644dbe9bd",
          "name" : "https://git.kernel.org/stable/c/5a7090ccc242ab009ee7769e9d7fad6644dbe9bd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b80422474ffe44cb5e813cd6da1f1c6bc50fd9d2",
          "name" : "https://git.kernel.org/stable/c/b80422474ffe44cb5e813cd6da1f1c6bc50fd9d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c053e389db0d892e2ff5a60ec5e533b976503795",
          "name" : "https://git.kernel.org/stable/c/c053e389db0d892e2ff5a60ec5e533b976503795",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d4174505016a3b2996eb7ff1530dcabbf15d47b6",
          "name" : "https://git.kernel.org/stable/c/d4174505016a3b2996eb7ff1530dcabbf15d47b6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/eb307d09fe15844fdaebeb8cc8c9b9e925430aa5",
          "name" : "https://git.kernel.org/stable/c/eb307d09fe15844fdaebeb8cc8c9b9e925430aa5",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: call rcu_barrier() in ksmbd_server_exit()\n\nracy issue is triggered the bug by racing between closing a connection\nand rmmod. In ksmbd, rcu_barrier() is not called at module unload time,\nso nothing prevents ksmbd from getting unloaded while it still has RCU\ncallbacks pending. It leads to trigger unintended execution of kernel\ncode locally and use to defeat protections such as Kernel Lockdown"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T14:15Z",
    "lastModifiedDate" : "2025-08-16T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8878",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/Classes/RegistrationAuth.php#L131",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/Classes/RegistrationAuth.php#L131",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L318",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L318",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L329",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L329",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L339",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L339",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L385",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-user-avatar/trunk/src/ShortcodeParser/Builder/FrontendProfileBuilder.php#L385",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3345295/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3345295/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9309b8bf-f581-4a56-a1ed-3941ebb36127?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9309b8bf-f581-4a56-a1ed-3941ebb36127?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The The Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 4.16.4. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8143",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "name" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8852d39-e34a-45d3-aee8-1ccbfc0ab238?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8852d39-e34a-45d3-aee8-1ccbfc0ab238?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Soledad theme for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pcsml_smartlists_h’ parameter in all versions up to, and including, 8.6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8142",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "name" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7dea9b4a-d7a5-4ea7-b55f-b42f8f5c4a91?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7dea9b4a-d7a5-4ea7-b55f-b42f8f5c4a91?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Soledad theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 8.6.7 via the 'header_layout' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary .php files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where .php file types can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8105",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "name" : "https://themeforest.net/item/soledad-multiconcept-blogmagazine-wp-theme/12945398#item-description__update-changelog",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6c842bb-914a-47c1-aaac-e748f58e12ef?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a6c842bb-914a-47c1-aaac-e748f58e12ef?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The The Soledad theme for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 8.6.7. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38552",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/659da22dee5ff316ba63bdaeeac7b58b5442f6c2",
          "name" : "https://git.kernel.org/stable/c/659da22dee5ff316ba63bdaeeac7b58b5442f6c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7c96d519ee15a130842a6513530b4d20acd2bfcd",
          "name" : "https://git.kernel.org/stable/c/7c96d519ee15a130842a6513530b4d20acd2bfcd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/def5b7b2643ebba696fc60ddf675dca13f073486",
          "name" : "https://git.kernel.org/stable/c/def5b7b2643ebba696fc60ddf675dca13f073486",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f81b6fbe13c7fc413b5158cdffc6a59391a2a8db",
          "name" : "https://git.kernel.org/stable/c/f81b6fbe13c7fc413b5158cdffc6a59391a2a8db",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nmptcp: plug races between subflow fail and subflow creation\n\nWe have races similar to the one addressed by the previous patch between\nsubflow failing and additional subflow creation. They are just harder to\ntrigger.\n\nThe solution is similar. Use a separate flag to track the condition\n'socket state prevent any additional subflow creation' protected by the\nfallback lock.\n\nThe socket fallback makes such flag true, and also receiving or sending\nan MP_FAIL option.\n\nThe field 'allow_infinite_fallback' is now always touched under the\nrelevant lock, we can drop the ONCE annotation on write."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38551",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3859f137b3c1fa1f0031d54263234566bdcdd7aa",
          "name" : "https://git.kernel.org/stable/c/3859f137b3c1fa1f0031d54263234566bdcdd7aa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4e7c46362550b229354aeb52038f414e231b0037",
          "name" : "https://git.kernel.org/stable/c/4e7c46362550b229354aeb52038f414e231b0037",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/be5dcaed694e4255dc02dd0acfe036708c535def",
          "name" : "https://git.kernel.org/stable/c/be5dcaed694e4255dc02dd0acfe036708c535def",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio-net: fix recursived rtnl_lock() during probe()\n\nThe deadlock appears in a stack trace like:\n\n  virtnet_probe()\n    rtnl_lock()\n    virtio_config_changed_work()\n      netdev_notify_peers()\n        rtnl_lock()\n\nIt happens if the VMM sends a VIRTIO_NET_S_ANNOUNCE request while the\nvirtio-net driver is still probing.\n\nThe config_work in probe() will get scheduled until virtnet_open() enables\nthe config change notification via virtio_config_driver_enable()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38550",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5f18e0130194550dff734e155029ae734378b5ea",
          "name" : "https://git.kernel.org/stable/c/5f18e0130194550dff734e155029ae734378b5ea",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/728db00a14cacb37f36e9382ab5fad55caf890cc",
          "name" : "https://git.kernel.org/stable/c/728db00a14cacb37f36e9382ab5fad55caf890cc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7929d27c747eafe8fca3eecd74a334503ee4c839",
          "name" : "https://git.kernel.org/stable/c/7929d27c747eafe8fca3eecd74a334503ee4c839",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ae3264a25a4635531264728859dbe9c659fad554",
          "name" : "https://git.kernel.org/stable/c/ae3264a25a4635531264728859dbe9c659fad554",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/dcbc346f50a009d8b7f4e330f9f2e22d6442fa26",
          "name" : "https://git.kernel.org/stable/c/dcbc346f50a009d8b7f4e330f9f2e22d6442fa26",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: Delay put pmc->idev in mld_del_delrec()\n\npmc->idev is still used in ip6_mc_clear_src(), so as mld_clear_delrec()\ndoes, the reference should be put after ip6_mc_clear_src() return."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38549",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/64e135f1eaba0bbb0cdee859af3328c68d5b9789",
          "name" : "https://git.kernel.org/stable/c/64e135f1eaba0bbb0cdee859af3328c68d5b9789",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/816d36973467d1c9c08a48bdffe4675e219a2e84",
          "name" : "https://git.kernel.org/stable/c/816d36973467d1c9c08a48bdffe4675e219a2e84",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e9fabe7036bb8be6071f39dc38605508f5f57b20",
          "name" : "https://git.kernel.org/stable/c/e9fabe7036bb8be6071f39dc38605508f5f57b20",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nefivarfs: Fix memory leak of efivarfs_fs_info in fs_context error paths\n\nWhen processing mount options, efivarfs allocates efivarfs_fs_info (sfi)\nearly in fs_context initialization. However, sfi is associated with the\nsuperblock and typically freed when the superblock is destroyed. If the\nfs_context is released (final put) before fill_super is called—such as\non error paths or during reconfiguration—the sfi structure would leak,\nas ownership never transfers to the superblock.\n\nImplement the .free callback in efivarfs_context_ops to ensure any\nallocated sfi is properly freed if the fs_context is torn down before\nfill_super, preventing this memory leak."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38548",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0db770e2922389753ddbd6663a5516a32b97b743",
          "name" : "https://git.kernel.org/stable/c/0db770e2922389753ddbd6663a5516a32b97b743",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2771d2ee3d95700f34e1e4df6a445c90565cd4e9",
          "name" : "https://git.kernel.org/stable/c/2771d2ee3d95700f34e1e4df6a445c90565cd4e9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3c4bdc8a852e446080adc8ceb90ddd67a56e1bb8",
          "name" : "https://git.kernel.org/stable/c/3c4bdc8a852e446080adc8ceb90ddd67a56e1bb8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/495a4f0dce9c8c4478c242209748f1ee9e4d5820",
          "name" : "https://git.kernel.org/stable/c/495a4f0dce9c8c4478c242209748f1ee9e4d5820",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/eda5e38cc4dd2dcb422840540374910ef2818494",
          "name" : "https://git.kernel.org/stable/c/eda5e38cc4dd2dcb422840540374910ef2818494",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nhwmon: (corsair-cpro) Validate the size of the received input buffer\n\nAdd buffer_recv_size to store the size of the received bytes.\nValidate buffer_recv_size in send_usb_cmd()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38547",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/086a76474121bf2351438e311376ec67b410b2ea",
          "name" : "https://git.kernel.org/stable/c/086a76474121bf2351438e311376ec67b410b2ea",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/0c0c01c88bb69951539539d2001e67f0c613001f",
          "name" : "https://git.kernel.org/stable/c/0c0c01c88bb69951539539d2001e67f0c613001f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3281ddcea6429f7bc1fdb39d407752dd1371aba9",
          "name" : "https://git.kernel.org/stable/c/3281ddcea6429f7bc1fdb39d407752dd1371aba9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\niio: adc: axp20x_adc: Add missing sentinel to AXP717 ADC channel maps\n\nThe AXP717 ADC channel maps is missing a sentinel entry at the end. This\ncauses a KASAN warning.\n\nAdd the missing sentinel entry."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38546",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0c17ff462d98c997d707ee5cf4e4a9b1b52b9d90",
          "name" : "https://git.kernel.org/stable/c/0c17ff462d98c997d707ee5cf4e4a9b1b52b9d90",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1c075e88d5859a2c6b43b27e0e46fb281cef8039",
          "name" : "https://git.kernel.org/stable/c/1c075e88d5859a2c6b43b27e0e46fb281cef8039",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1fb9fb5a4b5cec2d56e26525ef8c519de858fa60",
          "name" : "https://git.kernel.org/stable/c/1fb9fb5a4b5cec2d56e26525ef8c519de858fa60",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2fb37ab3226606cbfc9b2b6f9e301b0b735734c5",
          "name" : "https://git.kernel.org/stable/c/2fb37ab3226606cbfc9b2b6f9e301b0b735734c5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/62dba28275a9a3104d4e33595c7b3328d4032d8d",
          "name" : "https://git.kernel.org/stable/c/62dba28275a9a3104d4e33595c7b3328d4032d8d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9e4dbeee56f614e3f1e166e5d0655a999ea185ef",
          "name" : "https://git.kernel.org/stable/c/9e4dbeee56f614e3f1e166e5d0655a999ea185ef",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9f771816f14da6d6157a8c30069091abf6b566fb",
          "name" : "https://git.kernel.org/stable/c/9f771816f14da6d6157a8c30069091abf6b566fb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cb2e4a2f8f268d8fba6662f663a2e57846f14a8d",
          "name" : "https://git.kernel.org/stable/c/cb2e4a2f8f268d8fba6662f663a2e57846f14a8d",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\natm: clip: Fix memory leak of struct clip_vcc.\n\nioctl(ATMARP_MKIP) allocates struct clip_vcc and set it to\nvcc->user_back.\n\nThe code assumes that vcc_destroy_socket() passes NULL skb\nto vcc->push() when the socket is close()d, and then clip_push()\nfrees clip_vcc.\n\nHowever, ioctl(ATMARPD_CTRL) sets NULL to vcc->push() in\natm_init_atmarp(), resulting in memory leak.\n\nLet's serialise two ioctl() by lock_sock() and check vcc->push()\nin atm_init_atmarp() to prevent memleak."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38545",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/02c4d6c26f1f662da8885b299c224ca6628ad232",
          "name" : "https://git.kernel.org/stable/c/02c4d6c26f1f662da8885b299c224ca6628ad232",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7d6ca0c8c0caf9a13cae2de763bb1f2a9ea7eabb",
          "name" : "https://git.kernel.org/stable/c/7d6ca0c8c0caf9a13cae2de763bb1f2a9ea7eabb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fc2fffa2facac15ce711e95f98f954426e025bc5",
          "name" : "https://git.kernel.org/stable/c/fc2fffa2facac15ce711e95f98f954426e025bc5",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: ethernet: ti: am65-cpsw-nuss: Fix skb size by accounting for skb_shared_info\n\nWhile transitioning from netdev_alloc_ip_align() to build_skb(), memory\nfor the \"skb_shared_info\" member of an \"skb\" was not allocated. Fix this\nby allocating \"PAGE_SIZE\" as the skb length, accounting for the packet\nlength, headroom and tailroom, thereby including the required memory space\nfor skb_shared_info."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38544",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/432c5363cd6fe5a928bbc94524d28b05515684dd",
          "name" : "https://git.kernel.org/stable/c/432c5363cd6fe5a928bbc94524d28b05515684dd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5385ad53793de2ab11e396bdcdaa65bb04b4dad6",
          "name" : "https://git.kernel.org/stable/c/5385ad53793de2ab11e396bdcdaa65bb04b4dad6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/69e4186773c6445b258fb45b6e1df18df831ec45",
          "name" : "https://git.kernel.org/stable/c/69e4186773c6445b258fb45b6e1df18df831ec45",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d8ffb47a443919277cb093c3db1ec6c0a06880b1",
          "name" : "https://git.kernel.org/stable/c/d8ffb47a443919277cb093c3db1ec6c0a06880b1",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix bug due to prealloc collision\n\nWhen userspace is using AF_RXRPC to provide a server, it has to preallocate\nincoming calls and assign to them call IDs that will be used to thread\nrelated recvmsg() and sendmsg() together.  The preallocated call IDs will\nautomatically be attached to calls as they come in until the pool is empty.\n\nTo the kernel, the call IDs are just arbitrary numbers, but userspace can\nuse the call ID to hold a pointer to prepared structs.  In any case, the\nuser isn't permitted to create two calls with the same call ID (call IDs\nbecome available again when the call ends) and EBADSLT should result from\nsendmsg() if an attempt is made to preallocate a call with an in-use call\nID.\n\nHowever, the cleanup in the error handling will trigger both assertions in\nrxrpc_cleanup_call() because the call isn't marked complete and isn't\nmarked as having been released.\n\nFix this by setting the call state in rxrpc_service_prealloc_one() and then\nmarking it as being released before calling the cleanup function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38543",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/2e0812eedccd0629d73c9d0b1184a5db055df1da",
          "name" : "https://git.kernel.org/stable/c/2e0812eedccd0629d73c9d0b1184a5db055df1da",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/44306a684cd1699b8562a54945ddc43e2abc9eab",
          "name" : "https://git.kernel.org/stable/c/44306a684cd1699b8562a54945ddc43e2abc9eab",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/61b8d20962d00b7df117011c52f97cbb9c76a669",
          "name" : "https://git.kernel.org/stable/c/61b8d20962d00b7df117011c52f97cbb9c76a669",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a560de522374af931fa994d161db3667b0bb2545",
          "name" : "https://git.kernel.org/stable/c/a560de522374af931fa994d161db3667b0bb2545",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d1240029f97ac8c06db4dd4407bbbf83e8d08570",
          "name" : "https://git.kernel.org/stable/c/d1240029f97ac8c06db4dd4407bbbf83e8d08570",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/tegra: nvdec: Fix dma_alloc_coherent error check\n\nCheck for NULL return value with dma_alloc_coherent, in line with\nRobin's fix for vic.c in 'drm/tegra: vic: Fix DMA API misuse'."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38542",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/473f3eadfc73b0fb6d8dee5829d19a5772e387f7",
          "name" : "https://git.kernel.org/stable/c/473f3eadfc73b0fb6d8dee5829d19a5772e387f7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4a17370da6e476d3d275534e9e9cd2d02c57ca46",
          "name" : "https://git.kernel.org/stable/c/4a17370da6e476d3d275534e9e9cd2d02c57ca46",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/64124cf0aab0dd1e18c0fb5ae66e45741e727f8b",
          "name" : "https://git.kernel.org/stable/c/64124cf0aab0dd1e18c0fb5ae66e45741e727f8b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/711c80f7d8b163d3ecd463cd96f07230f488e750",
          "name" : "https://git.kernel.org/stable/c/711c80f7d8b163d3ecd463cd96f07230f488e750",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a7852b01793669248dce0348d14df89e77a32afd",
          "name" : "https://git.kernel.org/stable/c/a7852b01793669248dce0348d14df89e77a32afd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b2f5dfa87367fdce9f8b995bc6c38f64f9ea2c90",
          "name" : "https://git.kernel.org/stable/c/b2f5dfa87367fdce9f8b995bc6c38f64f9ea2c90",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b92bedf71f25303e203a4e657489d76691a58119",
          "name" : "https://git.kernel.org/stable/c/b92bedf71f25303e203a4e657489d76691a58119",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d2e9f50f0bdad73b64a871f25186b899624518c4",
          "name" : "https://git.kernel.org/stable/c/d2e9f50f0bdad73b64a871f25186b899624518c4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: appletalk: Fix device refcount leak in atrtr_create()\n\nWhen updating an existing route entry in atrtr_create(), the old device\nreference was not being released before assigning the new device,\nleading to a device refcount leak. Fix this by calling dev_put() to\nrelease the old device reference before holding the new one."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38541",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/03ee8f73801a8f46d83dfc2bf73fb9ffa5a21602",
          "name" : "https://git.kernel.org/stable/c/03ee8f73801a8f46d83dfc2bf73fb9ffa5a21602",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1bbdf4213711bb6dc365e7628430a63dd3280794",
          "name" : "https://git.kernel.org/stable/c/1bbdf4213711bb6dc365e7628430a63dd3280794",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2e99e9b34ece0b6d3e82cb757e9f60fa414da999",
          "name" : "https://git.kernel.org/stable/c/2e99e9b34ece0b6d3e82cb757e9f60fa414da999",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mt76: mt7925: Fix null-ptr-deref in mt7925_thermal_init()\n\ndevm_kasprintf() returns NULL on error. Currently, mt7925_thermal_init()\ndoes not check for this case, which results in a NULL pointer\ndereference.\n\nAdd NULL check after devm_kasprintf() to prevent this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38540",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1b297ab6f38ca60a4ca7298b297944ec6043b2f4",
          "name" : "https://git.kernel.org/stable/c/1b297ab6f38ca60a4ca7298b297944ec6043b2f4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2b0931eee48208c25bb77486946dea8e96aa6a36",
          "name" : "https://git.kernel.org/stable/c/2b0931eee48208c25bb77486946dea8e96aa6a36",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/35f1a5360ac68d9629abbb3930a0a07901cba296",
          "name" : "https://git.kernel.org/stable/c/35f1a5360ac68d9629abbb3930a0a07901cba296",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3ce1d87d1f5d80322757aa917182deb7370963b9",
          "name" : "https://git.kernel.org/stable/c/3ce1d87d1f5d80322757aa917182deb7370963b9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/54bae4c17c11688339eb73a04fd24203bb6e7494",
          "name" : "https://git.kernel.org/stable/c/54bae4c17c11688339eb73a04fd24203bb6e7494",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7ac00f019698f614a49cce34c198d0568ab0e1c2",
          "name" : "https://git.kernel.org/stable/c/7ac00f019698f614a49cce34c198d0568ab0e1c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a2a91abd19c574b598b1c69ad76ad9c7eedaf062",
          "name" : "https://git.kernel.org/stable/c/a2a91abd19c574b598b1c69ad76ad9c7eedaf062",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c72536350e82b53a1be0f3bfdf1511bba2827102",
          "name" : "https://git.kernel.org/stable/c/c72536350e82b53a1be0f3bfdf1511bba2827102",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: quirks: Add quirk for 2 Chicony Electronics HP 5MP Cameras\n\nThe Chicony Electronics HP 5MP Cameras (USB ID 04F2:B824 & 04F2:B82C)\nreport a HID sensor interface that is not actually implemented.\nAttempting to access this non-functional sensor via iio_info causes\nsystem hangs as runtime PM tries to wake up an unresponsive sensor.\n\nAdd these 2 devices to the HID ignore list since the sensor interface is\nnon-functional by design and should not be exposed to userspace."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38539",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/33e20747b47ddc03569b6bc27a2d6894c1428182",
          "name" : "https://git.kernel.org/stable/c/33e20747b47ddc03569b6bc27a2d6894c1428182",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6bc94f20a4c304997288f9a45278c9d0c06987d3",
          "name" : "https://git.kernel.org/stable/c/6bc94f20a4c304997288f9a45278c9d0c06987d3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/70fecd519caad0c1741c3379d5348c9000a5b29d",
          "name" : "https://git.kernel.org/stable/c/70fecd519caad0c1741c3379d5348c9000a5b29d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7803b28c9aa8d8bd4e19ebcf5f0db9612b0f333b",
          "name" : "https://git.kernel.org/stable/c/7803b28c9aa8d8bd4e19ebcf5f0db9612b0f333b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b5e8acc14dcb314a9b61ff19dcd9fdd0d88f70df",
          "name" : "https://git.kernel.org/stable/c/b5e8acc14dcb314a9b61ff19dcd9fdd0d88f70df",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Add down_write(trace_event_sem) when adding trace event\n\nWhen a module is loaded, it adds trace events defined by the module. It\nmay also need to modify the modules trace printk formats to replace enum\nnames with their values.\n\nIf two modules are loaded at the same time, the adding of the event to the\nftrace_events list can corrupt the walking of the list in the code that is\nmodifying the printk format strings and crash the kernel.\n\nThe addition of the event should take the trace_event_sem for write while\nit adds the new event.\n\nAlso add a lockdep_assert_held() on that semaphore in\n__trace_add_event_dirs() as it iterates the list."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38538",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/122160289adf8ebf15060f1cbf6265b55a914948",
          "name" : "https://git.kernel.org/stable/c/122160289adf8ebf15060f1cbf6265b55a914948",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/188c6ba1dd925849c5d94885c8bbdeb0b3dcf510",
          "name" : "https://git.kernel.org/stable/c/188c6ba1dd925849c5d94885c8bbdeb0b3dcf510",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4bb016438335ec02b01f96bf1367378c2bfe03e5",
          "name" : "https://git.kernel.org/stable/c/4bb016438335ec02b01f96bf1367378c2bfe03e5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d6bbd67ab5de37a74ac85c83c5a26664b62034dd",
          "name" : "https://git.kernel.org/stable/c/d6bbd67ab5de37a74ac85c83c5a26664b62034dd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f366b36c5e3ce29c9a3c8eed3d1631908e4fc8bb",
          "name" : "https://git.kernel.org/stable/c/f366b36c5e3ce29c9a3c8eed3d1631908e4fc8bb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndmaengine: nbpfaxi: Fix memory corruption in probe()\n\nThe nbpf->chan[] array is allocated earlier in the nbpf_probe() function\nand it has \"num_channels\" elements.  These three loops iterate one\nelement farther than they should and corrupt memory.\n\nThe changes to the second loop are more involved.  In this case, we're\ncopying data from the irqbuf[] array into the nbpf->chan[] array.  If\nthe data in irqbuf[i] is the error IRQ then we skip it, so the iterators\nare not in sync.  I added a check to ensure that we don't go beyond the\nend of the irqbuf[] array.  I'm pretty sure this can't happen, but it\nseemed harmless to add a check.\n\nOn the other hand, after the loop has ended there is a check to ensure\nthat the \"chan\" iterator is where we expect it to be.  In the original\ncode we went one element beyond the end of the array so the iterator\nwasn't in the correct place and it would always return -EINVAL.  However,\nnow it will always be in the correct place.  I deleted the check since\nwe know the result."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38537",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/75e1b2079ef0653a2f7aa69be515d86b7faf1908",
          "name" : "https://git.kernel.org/stable/c/75e1b2079ef0653a2f7aa69be515d86b7faf1908",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ec158d05eaa91b2809cab65f8068290e3c05ebdd",
          "name" : "https://git.kernel.org/stable/c/ec158d05eaa91b2809cab65f8068290e3c05ebdd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f0f2b992d8185a0366be951685e08643aae17d6d",
          "name" : "https://git.kernel.org/stable/c/f0f2b992d8185a0366be951685e08643aae17d6d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fd6493533af9e5d73d0d42ff2a8ded978a701dc6",
          "name" : "https://git.kernel.org/stable/c/fd6493533af9e5d73d0d42ff2a8ded978a701dc6",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: Don't register LEDs for genphy\n\nIf a PHY has no driver, the genphy driver is probed/removed directly in\nphy_attach/detach. If the PHY's ofnode has an \"leds\" subnode, then the\nLEDs will be (un)registered when probing/removing the genphy driver.\nThis could occur if the leds are for a non-generic driver that isn't\nloaded for whatever reason. Synchronously removing the PHY device in\nphy_detach leads to the following deadlock:\n\nrtnl_lock()\nndo_close()\n    ...\n    phy_detach()\n        phy_remove()\n            phy_leds_unregister()\n                led_classdev_unregister()\n                    led_trigger_set()\n                        netdev_trigger_deactivate()\n                            unregister_netdevice_notifier()\n                                rtnl_lock()\n\nThere is a corresponding deadlock on the open/register side of things\n(and that one is reported by lockdep), but it requires a race while this\none is deterministic.\n\nGeneric PHYs do not support LEDs anyway, so don't bother registering\nthem."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38536",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3cd582e7d0787506990ef0180405eb6224fa90a6",
          "name" : "https://git.kernel.org/stable/c/3cd582e7d0787506990ef0180405eb6224fa90a6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/df6bf96b41e547e350667bc4c143be53646d070d",
          "name" : "https://git.kernel.org/stable/c/df6bf96b41e547e350667bc4c143be53646d070d",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: airoha: fix potential use-after-free in airoha_npu_get()\n\nnp->name was being used after calling of_node_put(np), which\nreleases the node and can lead to a use-after-free bug.\nPreviously, of_node_put(np) was called unconditionally after\nof_find_device_by_node(np), which could result in a use-after-free if\npdev is NULL.\n\nThis patch moves of_node_put(np) after the error check to ensure\nthe node is only released after both the error and success cases\nare handled appropriately, preventing potential resource issues."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38535",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1bb85b5c2bd43b687c3d54eb6328917f90dd38fc",
          "name" : "https://git.kernel.org/stable/c/1bb85b5c2bd43b687c3d54eb6328917f90dd38fc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5367cdeb75cb6c687ca468450bceb2602ab239d8",
          "name" : "https://git.kernel.org/stable/c/5367cdeb75cb6c687ca468450bceb2602ab239d8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cefc1caee9dd06c69e2d807edc5949b329f52b22",
          "name" : "https://git.kernel.org/stable/c/cefc1caee9dd06c69e2d807edc5949b329f52b22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/eaa420339658615d26c1cc95cd6cf720b9aebfca",
          "name" : "https://git.kernel.org/stable/c/eaa420339658615d26c1cc95cd6cf720b9aebfca",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ec7f98ff05f0649af0adeb4808c7ba23d6111ef9",
          "name" : "https://git.kernel.org/stable/c/ec7f98ff05f0649af0adeb4808c7ba23d6111ef9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: tegra: xusb: Fix unbalanced regulator disable in UTMI PHY mode\n\nWhen transitioning from USB_ROLE_DEVICE to USB_ROLE_NONE, the code\nassumed that the regulator should be disabled. However, if the regulator\nis marked as always-on, regulator_is_enabled() continues to return true,\nleading to an incorrect attempt to disable a regulator which is not\nenabled.\n\nThis can result in warnings such as:\n\n[  250.155624] WARNING: CPU: 1 PID: 7326 at drivers/regulator/core.c:3004\n_regulator_disable+0xe4/0x1a0\n[  250.155652] unbalanced disables for VIN_SYS_5V0\n\nTo fix this, we move the regulator control logic into\ntegra186_xusb_padctl_id_override() function since it's directly related\nto the ID override state. The regulator is now only disabled when the role\ntransitions from USB_ROLE_HOST to USB_ROLE_NONE, by checking the VBUS_ID\nregister. This ensures that regulator enable/disable operations are\nproperly balanced and only occur when actually transitioning to/from host\nmode."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38534",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1ebe58cef84eab22b41b4d5e72c2051ebf00af50",
          "name" : "https://git.kernel.org/stable/c/1ebe58cef84eab22b41b4d5e72c2051ebf00af50",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/4c238e30774e3022a505fa54311273add7570f13",
          "name" : "https://git.kernel.org/stable/c/4c238e30774e3022a505fa54311273add7570f13",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfs: Fix copy-to-cache so that it performs collection with ceph+fscache\n\nThe netfs copy-to-cache that is used by Ceph with local caching sets up a\nnew request to write data just read to the cache.  The request is started\nand then left to look after itself whilst the app continues.  The request\ngets notified by the backing fs upon completion of the async DIO write, but\nthen tries to wake up the app because NETFS_RREQ_OFFLOAD_COLLECTION isn't\nset - but the app isn't waiting there, and so the request just hangs.\n\nFix this by setting NETFS_RREQ_OFFLOAD_COLLECTION which causes the\nnotification from the backing filesystem to put the collection onto a work\nqueue instead."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38533",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/027701180a7bcb64c42eab291133ef0c87b5b6c5",
          "name" : "https://git.kernel.org/stable/c/027701180a7bcb64c42eab291133ef0c87b5b6c5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/05c37b574997892a40a0e9b9b88a481566b2367d",
          "name" : "https://git.kernel.org/stable/c/05c37b574997892a40a0e9b9b88a481566b2367d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5fd77cc6bd9b368431a815a780e407b7781bcca0",
          "name" : "https://git.kernel.org/stable/c/5fd77cc6bd9b368431a815a780e407b7781bcca0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ba7c793f96c1c2b944bb6f423d7243f3afc30fe9",
          "name" : "https://git.kernel.org/stable/c/ba7c793f96c1c2b944bb6f423d7243f3afc30fe9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: fix the using of Rx buffer DMA\n\nThe wx_rx_buffer structure contained two DMA address fields: 'dma' and\n'page_dma'. However, only 'page_dma' was actually initialized and used\nto program the Rx descriptor. But 'dma' was uninitialized and used in\nsome paths.\n\nThis could lead to undefined behavior, including DMA errors or\nuse-after-free, if the uninitialized 'dma' was used. Althrough such\nerror has not yet occurred, it is worth fixing in the code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38532",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/10e27b2a6ebeda49e9c2897a699d3ce1ded565ee",
          "name" : "https://git.kernel.org/stable/c/10e27b2a6ebeda49e9c2897a699d3ce1ded565ee",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d510116c80b37efb100ce8d5ee326214b0157293",
          "name" : "https://git.kernel.org/stable/c/d510116c80b37efb100ce8d5ee326214b0157293",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d992ed7e1b687ad7df0763d3e015a5358646210b",
          "name" : "https://git.kernel.org/stable/c/d992ed7e1b687ad7df0763d3e015a5358646210b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ee527d3fba4dae1d619d2d0438624002c8e99e24",
          "name" : "https://git.kernel.org/stable/c/ee527d3fba4dae1d619d2d0438624002c8e99e24",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: libwx: properly reset Rx ring descriptor\n\nWhen device reset is triggered by feature changes such as toggling Rx\nVLAN offload, wx->do_reset() is called to reinitialize Rx rings. The\nhardware descriptor ring may retain stale values from previous sessions.\nAnd only set the length to 0 in rx_desc[0] would result in building\nmalformed SKBs. Fix it to ensure a clean slate after device reset.\n\n[  549.186435] [     C16] ------------[ cut here ]------------\n[  549.186457] [     C16] kernel BUG at net/core/skbuff.c:2814!\n[  549.186468] [     C16] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[  549.186472] [     C16] CPU: 16 UID: 0 PID: 0 Comm: swapper/16 Kdump: loaded Not tainted 6.16.0-rc4+ #23 PREEMPT(voluntary)\n[  549.186476] [     C16] Hardware name: Micro-Star International Co., Ltd. MS-7E16/X670E GAMING PLUS WIFI (MS-7E16), BIOS 1.90 12/31/2024\n[  549.186478] [     C16] RIP: 0010:__pskb_pull_tail+0x3ff/0x510\n[  549.186484] [     C16] Code: 06 f0 ff 4f 34 74 7b 4d 8b 8c 24 c8 00 00 00 45 8b 84 24 c0 00 00 00 e9 c8 fd ff ff 48 c7 44 24 08 00 00 00 00 e9 5e fe ff ff <0f> 0b 31 c0 e9 23 90 5b ff 41 f7 c6 ff 0f 00 00 75 bf 49 8b 06 a8\n[  549.186487] [     C16] RSP: 0018:ffffb391c0640d70 EFLAGS: 00010282\n[  549.186490] [     C16] RAX: 00000000fffffff2 RBX: ffff8fe7e4d40200 RCX: 00000000fffffff2\n[  549.186492] [     C16] RDX: ffff8fe7c3a4bf8e RSI: 0000000000000180 RDI: ffff8fe7c3a4bf40\n[  549.186494] [     C16] RBP: ffffb391c0640da8 R08: ffff8fe7c3a4c0c0 R09: 000000000000000e\n[  549.186496] [     C16] R10: ffffb391c0640d88 R11: 000000000000000e R12: ffff8fe7e4d40200\n[  549.186497] [     C16] R13: 00000000fffffff2 R14: ffff8fe7fa01a000 R15: 00000000fffffff2\n[  549.186499] [     C16] FS:  0000000000000000(0000) GS:ffff8fef5ae40000(0000) knlGS:0000000000000000\n[  549.186502] [     C16] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  549.186503] [     C16] CR2: 00007f77d81d6000 CR3: 000000051a032000 CR4: 0000000000750ef0\n[  549.186505] [     C16] PKRU: 55555554\n[  549.186507] [     C16] Call Trace:\n[  549.186510] [     C16]  <IRQ>\n[  549.186513] [     C16]  ? srso_alias_return_thunk+0x5/0xfbef5\n[  549.186517] [     C16]  __skb_pad+0xc7/0xf0\n[  549.186523] [     C16]  wx_clean_rx_irq+0x355/0x3b0 [libwx]\n[  549.186533] [     C16]  wx_poll+0x92/0x120 [libwx]\n[  549.186540] [     C16]  __napi_poll+0x28/0x190\n[  549.186544] [     C16]  net_rx_action+0x301/0x3f0\n[  549.186548] [     C16]  ? srso_alias_return_thunk+0x5/0xfbef5\n[  549.186551] [     C16]  ? __raw_spin_lock_irqsave+0x1e/0x50\n[  549.186554] [     C16]  ? srso_alias_return_thunk+0x5/0xfbef5\n[  549.186557] [     C16]  ? wake_up_nohz_cpu+0x35/0x160\n[  549.186559] [     C16]  ? srso_alias_return_thunk+0x5/0xfbef5\n[  549.186563] [     C16]  handle_softirqs+0xf9/0x2c0\n[  549.186568] [     C16]  __irq_exit_rcu+0xc7/0x130\n[  549.186572] [     C16]  common_interrupt+0xb8/0xd0\n[  549.186576] [     C16]  </IRQ>\n[  549.186577] [     C16]  <TASK>\n[  549.186579] [     C16]  asm_common_interrupt+0x22/0x40\n[  549.186582] [     C16] RIP: 0010:cpuidle_enter_state+0xc2/0x420\n[  549.186585] [     C16] Code: 00 00 e8 11 0e 5e ff e8 ac f0 ff ff 49 89 c5 0f 1f 44 00 00 31 ff e8 0d ed 5c ff 45 84 ff 0f 85 40 02 00 00 fb 0f 1f 44 00 00 <45> 85 f6 0f 88 84 01 00 00 49 63 d6 48 8d 04 52 48 8d 04 82 49 8d\n[  549.186587] [     C16] RSP: 0018:ffffb391c0277e78 EFLAGS: 00000246\n[  549.186590] [     C16] RAX: ffff8fef5ae40000 RBX: 0000000000000003 RCX: 0000000000000000\n[  549.186591] [     C16] RDX: 0000007fde0faac5 RSI: ffffffff826e53f6 RDI: ffffffff826fa9b3\n[  549.186593] [     C16] RBP: ffff8fe7c3a20800 R08: 0000000000000002 R09: 0000000000000000\n[  549.186595] [     C16] R10: 0000000000000000 R11: 000000000000ffff R12: ffffffff82ed7a40\n[  549.186596] [     C16] R13: 0000007fde0faac5 R14: 0000000000000003 R15: 0000000000000000\n[  549.186601] [     C16]  ? cpuidle_enter_state+0xb3/0x420\n[  549.186605] [     C16]  cpuidle_en\n---truncated---"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38531",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3297a9016a45144883ec990bd4bd5b1d79cafb46",
          "name" : "https://git.kernel.org/stable/c/3297a9016a45144883ec990bd4bd5b1d79cafb46",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/610615c9668037e3eca11132063b93b2d945af13",
          "name" : "https://git.kernel.org/stable/c/610615c9668037e3eca11132063b93b2d945af13",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/9f92e93e257b33e73622640a9205f8642ec16ddd",
          "name" : "https://git.kernel.org/stable/c/9f92e93e257b33e73622640a9205f8642ec16ddd",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\niio: common: st_sensors: Fix use of uninitialize device structs\n\nThroughout the various probe functions &indio_dev->dev is used before it\nis initialized. This caused a kernel panic in st_sensors_power_enable()\nwhen the call to devm_regulator_bulk_get_enable() fails and then calls\ndev_err_probe() with the uninitialized device.\n\nThis seems to only cause a panic with dev_err_probe(), dev_err(),\ndev_warn() and dev_info() don't seem to cause a panic, but are fixed\nas well.\n\nThe issue is reported and traced here: [1]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38530",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862",
          "name" : "https://git.kernel.org/stable/c/16c173abee315953fd17a279352fec4a1faee862",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416",
          "name" : "https://git.kernel.org/stable/c/5bfa301e1e59a9b1a7b62a800b54852337c97416",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a",
          "name" : "https://git.kernel.org/stable/c/7e470d8efd10725b189ca8951973a8425932398a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4",
          "name" : "https://git.kernel.org/stable/c/a27e27eee313fe1c450b6af1e80e64412546cab4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632",
          "name" : "https://git.kernel.org/stable/c/b14b076ce593f72585412fc7fd3747e03a5e3632",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: pcl812: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & board->irq_bits) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38529",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53",
          "name" : "https://git.kernel.org/stable/c/43ddd82e6a91913cea1c078e782afd8de60c3a53",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4",
          "name" : "https://git.kernel.org/stable/c/66acb1586737a22dd7b78abc63213b1bcaa100e4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c",
          "name" : "https://git.kernel.org/stable/c/955e8835855fed8e87f7d8c8075564a1746c1b4c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba",
          "name" : "https://git.kernel.org/stable/c/e0f3c0867d7d231c70984f05c97752caacd0daba",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7",
          "name" : "https://git.kernel.org/stable/c/ff30dd3f15f443d2a0085b12ec2cc95d44f35fa7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncomedi: aio_iiro_16: Fix bit shift out of bounds\n\nWhen checking for a supported IRQ number, the following test is used:\n\n\tif ((1 << it->options[1]) & 0xdcfc) {\n\nHowever, `it->options[i]` is an unchecked `int` value from userspace, so\nthe shift amount could be negative or out of bounds.  Fix the test by\nrequiring `it->options[1]` to be within bounds before proceeding with\nthe original test.  Valid `it->options[1]` values that select the IRQ\nwill be in the range [1,15]. The value 0 explicitly disables the use of\ninterrupts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38528",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1c5f5fd47bbda17cb885fe6f03730702cd53d3f8",
          "name" : "https://git.kernel.org/stable/c/1c5f5fd47bbda17cb885fe6f03730702cd53d3f8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/61d5fa45ed13e42af14c7e959baba9908b8ee6d4",
          "name" : "https://git.kernel.org/stable/c/61d5fa45ed13e42af14c7e959baba9908b8ee6d4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6952aeace93f8c9ea01849efecac24dd3152c9c9",
          "name" : "https://git.kernel.org/stable/c/6952aeace93f8c9ea01849efecac24dd3152c9c9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e7be679124bae8cf4fa6e40d7e1661baddfb3289",
          "name" : "https://git.kernel.org/stable/c/e7be679124bae8cf4fa6e40d7e1661baddfb3289",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f8242745871f81a3ac37f9f51853d12854fd0b58",
          "name" : "https://git.kernel.org/stable/c/f8242745871f81a3ac37f9f51853d12854fd0b58",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Reject %p% format string in bprintf-like helpers\n\nstatic const char fmt[] = \"%p%\";\n    bpf_trace_printk(fmt, sizeof(fmt));\n\nThe above BPF program isn't rejected and causes a kernel warning at\nruntime:\n\n    Please remove unsupported %\\x00 in format string\n    WARNING: CPU: 1 PID: 7244 at lib/vsprintf.c:2680 format_decode+0x49c/0x5d0\n\nThis happens because bpf_bprintf_prepare skips over the second %,\ndetected as punctuation, while processing %p. This patch fixes it by\nnot skipping over punctuation. %\\x00 is then processed in the next\niteration and rejected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38527",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
          "name" : "https://git.kernel.org/stable/c/09bce2138a30ef10d8821c8c3f73a4ab7a5726bc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
          "name" : "https://git.kernel.org/stable/c/0a4eec84d4d2c4085d4ed8630fd74e4b39033c1b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
          "name" : "https://git.kernel.org/stable/c/2baaf5bbab2ac474c4f92c10fcb3310f824db995",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
          "name" : "https://git.kernel.org/stable/c/705c79101ccf9edea5a00d761491a03ced314210",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
          "name" : "https://git.kernel.org/stable/c/da11bd4b697b393a207f19a2ed7d382a811a3ddc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nsmb: client: fix use-after-free in cifs_oplock_break\n\nA race condition can occur in cifs_oplock_break() leading to a\nuse-after-free of the cinode structure when unmounting:\n\n  cifs_oplock_break()\n    _cifsFileInfo_put(cfile)\n      cifsFileInfo_put_final()\n        cifs_sb_deactive()\n          [last ref, start releasing sb]\n            kill_sb()\n              kill_anon_super()\n                generic_shutdown_super()\n                  evict_inodes()\n                    dispose_list()\n                      evict()\n                        destroy_inode()\n                          call_rcu(&inode->i_rcu, i_callback)\n    spin_lock(&cinode->open_file_lock)  <- OK\n                            [later] i_callback()\n                              cifs_free_inode()\n                                kmem_cache_free(cinode)\n    spin_unlock(&cinode->open_file_lock)  <- UAF\n    cifs_done_oplock_break(cinode)       <- UAF\n\nThe issue occurs when umount has already released its reference to the\nsuperblock. When _cifsFileInfo_put() calls cifs_sb_deactive(), this\nreleases the last reference, triggering the immediate cleanup of all\ninodes under RCU. However, cifs_oplock_break() continues to access the\ncinode after this point, resulting in use-after-free.\n\nFix this by holding an extra reference to the superblock during the\nentire oplock break operation. This ensures that the superblock and\nits inodes remain valid until the oplock break completes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38526",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/245917d3c5ed7c6ae720302b64eac5c6f0c85177",
          "name" : "https://git.kernel.org/stable/c/245917d3c5ed7c6ae720302b64eac5c6f0c85177",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/27591d926191e42b2332e4bad3bcd3a49def393b",
          "name" : "https://git.kernel.org/stable/c/27591d926191e42b2332e4bad3bcd3a49def393b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3ce58b01ada408b372f15b7c992ed0519840e3cf",
          "name" : "https://git.kernel.org/stable/c/3ce58b01ada408b372f15b7c992ed0519840e3cf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5a5d64f0eec82076b2c09fee2195d640cfbe3379",
          "name" : "https://git.kernel.org/stable/c/5a5d64f0eec82076b2c09fee2195d640cfbe3379",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nice: add NULL check in eswitch lag check\n\nThe function ice_lag_is_switchdev_running() is being called from outside of\nthe LAG event handler code.  This results in the lag->upper_netdev being\nNULL sometimes.  To avoid a NULL-pointer dereference, there needs to be a\ncheck before it is dereferenced."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38525",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/2029f21f10dedb88c0f86abffcf8d6c21dcf6040",
          "name" : "https://git.kernel.org/stable/c/2029f21f10dedb88c0f86abffcf8d6c21dcf6040",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e4d2878369d590bf8455e3678a644e503172eafa",
          "name" : "https://git.kernel.org/stable/c/e4d2878369d590bf8455e3678a644e503172eafa",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix irq-disabled in local_bh_enable()\n\nThe rxrpc_assess_MTU_size() function calls down into the IP layer to find\nout the MTU size for a route.  When accepting an incoming call, this is\ncalled from rxrpc_new_incoming_call() which holds interrupts disabled\nacross the code that calls down to it.  Unfortunately, the IP layer uses\nlocal_bh_enable() which, config dependent, throws a warning if IRQs are\nenabled:\n\nWARNING: CPU: 1 PID: 5544 at kernel/softirq.c:387 __local_bh_enable_ip+0x43/0xd0\n...\nRIP: 0010:__local_bh_enable_ip+0x43/0xd0\n...\nCall Trace:\n <TASK>\n rt_cache_route+0x7e/0xa0\n rt_set_nexthop.isra.0+0x3b3/0x3f0\n __mkroute_output+0x43a/0x460\n ip_route_output_key_hash+0xf7/0x140\n ip_route_output_flow+0x1b/0x90\n rxrpc_assess_MTU_size.isra.0+0x2a0/0x590\n rxrpc_new_incoming_peer+0x46/0x120\n rxrpc_alloc_incoming_call+0x1b1/0x400\n rxrpc_new_incoming_call+0x1da/0x5e0\n rxrpc_input_packet+0x827/0x900\n rxrpc_io_thread+0x403/0xb60\n kthread+0x2f7/0x310\n ret_from_fork+0x2a/0x230\n ret_from_fork_asm+0x1a/0x30\n...\nhardirqs last  enabled at (23): _raw_spin_unlock_irq+0x24/0x50\nhardirqs last disabled at (24): _raw_read_lock_irq+0x17/0x70\nsoftirqs last  enabled at (0): copy_process+0xc61/0x2730\nsoftirqs last disabled at (25): rt_add_uncached_list+0x3c/0x90\n\nFix this by moving the call to rxrpc_assess_MTU_size() out of\nrxrpc_init_peer() and further up the stack where it can be done without\ninterrupts disabled.\n\nIt shouldn't be a problem for rxrpc_new_incoming_call() to do it after the\nlocks are dropped as pmtud is going to be performed by the I/O thread - and\nwe're in the I/O thread at this point."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38524",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/6c75a97a32a5fa2060c3dd30207e63b6914b606d",
          "name" : "https://git.kernel.org/stable/c/6c75a97a32a5fa2060c3dd30207e63b6914b606d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7692bde890061797f3dece0148d7859e85c55778",
          "name" : "https://git.kernel.org/stable/c/7692bde890061797f3dece0148d7859e85c55778",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/839fe96c15209dc2255c064bb44b636efe04f032",
          "name" : "https://git.kernel.org/stable/c/839fe96c15209dc2255c064bb44b636efe04f032",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/962fb1f651c2cf2083e0c3ef53ba69e3b96d3fbc",
          "name" : "https://git.kernel.org/stable/c/962fb1f651c2cf2083e0c3ef53ba69e3b96d3fbc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix recv-recv race of completed call\n\nIf a call receives an event (such as incoming data), the call gets placed\non the socket's queue and a thread in recvmsg can be awakened to go and\nprocess it.  Once the thread has picked up the call off of the queue,\nfurther events will cause it to be requeued, and once the socket lock is\ndropped (recvmsg uses call->user_mutex to allow the socket to be used in\nparallel), a second thread can come in and its recvmsg can pop the call off\nthe socket queue again.\n\nIn such a case, the first thread will be receiving stuff from the call and\nthe second thread will be blocked on call->user_mutex.  The first thread\ncan, at this point, process both the event that it picked call for and the\nevent that the second thread picked the call for and may see the call\nterminate - in which case the call will be \"released\", decoupling the call\nfrom the user call ID assigned to it (RXRPC_USER_CALL_ID in the control\nmessage).\n\nThe first thread will return okay, but then the second thread will wake up\nholding the user_mutex and, if it sees that the call has been released by\nthe first thread, it will BUG thusly:\n\n\tkernel BUG at net/rxrpc/recvmsg.c:474!\n\nFix this by just dequeuing the call and ignoring it if it is seen to be\nalready released.  We can't tell userspace about it anyway as the user call\nID has become stale."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38523",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/43e7e284fc77b710d899569360ea46fa3374ae22",
          "name" : "https://git.kernel.org/stable/c/43e7e284fc77b710d899569360ea46fa3374ae22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/87dcc7e33fc3dcb8ed32333cec016528b5bb6ce4",
          "name" : "https://git.kernel.org/stable/c/87dcc7e33fc3dcb8ed32333cec016528b5bb6ce4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f0dd353d47f7051afa98c6c60c7486831eb1a410",
          "name" : "https://git.kernel.org/stable/c/f0dd353d47f7051afa98c6c60c7486831eb1a410",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix the smbd_response slab to allow usercopy\n\nThe handling of received data in the smbdirect client code involves using\ncopy_to_iter() to copy data from the smbd_reponse struct's packet trailer\nto a folioq buffer provided by netfslib that encapsulates a chunk of\npagecache.\n\nIf, however, CONFIG_HARDENED_USERCOPY=y, this will result in the checks\nthen performed in copy_to_iter() oopsing with something like the following:\n\n CIFS: Attempting to mount //172.31.9.1/test\n CIFS: VFS: RDMA transport established\n usercopy: Kernel memory exposure attempt detected from SLUB object 'smbd_response_0000000091e24ea1' (offset 81, size 63)!\n ------------[ cut here ]------------\n kernel BUG at mm/usercopy.c:102!\n ...\n RIP: 0010:usercopy_abort+0x6c/0x80\n ...\n Call Trace:\n  <TASK>\n  __check_heap_object+0xe3/0x120\n  __check_object_size+0x4dc/0x6d0\n  smbd_recv+0x77f/0xfe0 [cifs]\n  cifs_readv_from_socket+0x276/0x8f0 [cifs]\n  cifs_read_from_socket+0xcd/0x120 [cifs]\n  cifs_demultiplex_thread+0x7e9/0x2d50 [cifs]\n  kthread+0x396/0x830\n  ret_from_fork+0x2b8/0x3b0\n  ret_from_fork_asm+0x1a/0x30\n\nThe problem is that the smbd_response slab's packet field isn't marked as\nbeing permitted for usercopy.\n\nFix this by passing parameters to kmem_slab_create() to indicate that\ncopy_to_iter() is permitted from the packet region of the smbd_response\nslab objects, less the header space."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38522",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/237c43037b336e36a49eb9f2daac1c7719ec7f8b",
          "name" : "https://git.kernel.org/stable/c/237c43037b336e36a49eb9f2daac1c7719ec7f8b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e14fd98c6d66cb76694b12c05768e4f9e8c95664",
          "name" : "https://git.kernel.org/stable/c/e14fd98c6d66cb76694b12c05768e4f9e8c95664",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nsched/ext: Prevent update_locked_rq() calls with NULL rq\n\nAvoid invoking update_locked_rq() when the runqueue (rq) pointer is NULL\nin the SCX_CALL_OP and SCX_CALL_OP_RET macros.\n\nPreviously, calling update_locked_rq(NULL) with preemption enabled could\ntrigger the following warning:\n\n    BUG: using __this_cpu_write() in preemptible [00000000]\n\nThis happens because __this_cpu_write() is unsafe to use in preemptible\ncontext.\n\nrq is NULL when an ops invoked from an unlocked context. In such cases, we\ndon't need to store any rq, since the value should already be NULL\n(unlocked). Ensure that update_locked_rq() is only called when rq is\nnon-NULL, preventing calling __this_cpu_write() on preemptible context."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T12:15Z",
    "lastModifiedDate" : "2025-08-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9092",
        "ASSIGNER" : "feedback-crypto@bouncycastle.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%909092",
          "name" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%909092",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled Resource Consumption vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0 bc-fips (API modules) allows Excessive Allocation. This vulnerability is associated with program files org.Bouncycastle.Crypto.Fips.NativeLoader.\n\nThis issue affects Bouncy Castle for Java - BC-FJA 2.1.0: from BC-FJA 2.1.0 through 2.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38521",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/9f852d301f642223c4798f3c13ba15e91165d078",
          "name" : "https://git.kernel.org/stable/c/9f852d301f642223c4798f3c13ba15e91165d078",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d38376b3ee48d073c64e75e150510d7e6b4b04f7",
          "name" : "https://git.kernel.org/stable/c/d38376b3ee48d073c64e75e150510d7e6b4b04f7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e066cc6e0f094ca2120f1928d126d56f686cd73e",
          "name" : "https://git.kernel.org/stable/c/e066cc6e0f094ca2120f1928d126d56f686cd73e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/imagination: Fix kernel crash when hard resetting the GPU\n\nThe GPU hard reset sequence calls pm_runtime_force_suspend() and\npm_runtime_force_resume(), which according to their documentation should\nonly be used during system-wide PM transitions to sleep states.\n\nThe main issue though is that depending on some internal runtime PM\nstate as seen by pm_runtime_force_suspend() (whether the usage count is\n<= 1), pm_runtime_force_resume() might not resume the device unless\nneeded. If that happens, the runtime PM resume callback\npvr_power_device_resume() is not called, the GPU clocks are not\nre-enabled, and the kernel crashes on the next attempt to access GPU\nregisters as part of the power-on sequence.\n\nReplace calls to pm_runtime_force_suspend() and\npm_runtime_force_resume() with direct calls to the driver's runtime PM\ncallbacks, pvr_power_device_suspend() and pvr_power_device_resume(),\nto ensure clocks are re-enabled and avoid the kernel crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38520",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/145a56bd68f4bff098d59fbc7c263d20dfef4fc4",
          "name" : "https://git.kernel.org/stable/c/145a56bd68f4bff098d59fbc7c263d20dfef4fc4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a7eb0a25010a674c8fdfbece38353ef7be8c5834",
          "name" : "https://git.kernel.org/stable/c/a7eb0a25010a674c8fdfbece38353ef7be8c5834",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c1bde9d48e09933c361521720f77a8072083c83a",
          "name" : "https://git.kernel.org/stable/c/c1bde9d48e09933c361521720f77a8072083c83a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cf234231fcbc7d391e2135b9518613218cc5347f",
          "name" : "https://git.kernel.org/stable/c/cf234231fcbc7d391e2135b9518613218cc5347f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e90ee15ce28c61f6d83a0511c3e02e2662478350",
          "name" : "https://git.kernel.org/stable/c/e90ee15ce28c61f6d83a0511c3e02e2662478350",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdkfd: Don't call mmput from MMU notifier callback\n\nIf the process is exiting, the mmput inside mmu notifier callback from\ncompactd or fork or numa balancing could release the last reference\nof mm struct to call exit_mmap and free_pgtable, this triggers deadlock\nwith below backtrace.\n\nThe deadlock will leak kfd process as mmu notifier release is not called\nand cause VRAM leaking.\n\nThe fix is to take mm reference mmget_non_zero when adding prange to the\ndeferred list to pair with mmput in deferred list work.\n\nIf prange split and add into pchild list, the pchild work_item.mm is not\nused, so remove the mm parameter from svm_range_unmap_split and\nsvm_range_add_child.\n\nThe backtrace of hung task:\n\n INFO: task python:348105 blocked for more than 64512 seconds.\n Call Trace:\n  __schedule+0x1c3/0x550\n  schedule+0x46/0xb0\n  rwsem_down_write_slowpath+0x24b/0x4c0\n  unlink_anon_vmas+0xb1/0x1c0\n  free_pgtables+0xa9/0x130\n  exit_mmap+0xbc/0x1a0\n  mmput+0x5a/0x140\n  svm_range_cpu_invalidate_pagetables+0x2b/0x40 [amdgpu]\n  mn_itree_invalidate+0x72/0xc0\n  __mmu_notifier_invalidate_range_start+0x48/0x60\n  try_to_unmap_one+0x10fa/0x1400\n  rmap_walk_anon+0x196/0x460\n  try_to_unmap+0xbb/0x210\n  migrate_page_unmap+0x54d/0x7e0\n  migrate_pages_batch+0x1c3/0xae0\n  migrate_pages_sync+0x98/0x240\n  migrate_pages+0x25c/0x520\n  compact_zone+0x29d/0x590\n  compact_zone_order+0xb6/0xf0\n  try_to_compact_pages+0xbe/0x220\n  __alloc_pages_direct_compact+0x96/0x1a0\n  __alloc_pages_slowpath+0x410/0x930\n  __alloc_pages_nodemask+0x3a9/0x3e0\n  do_huge_pmd_anonymous_page+0xd7/0x3e0\n  __handle_mm_fault+0x5e3/0x5f0\n  handle_mm_fault+0xf7/0x2e0\n  hmm_vma_fault.isra.0+0x4d/0xa0\n  walk_pmd_range.isra.0+0xa8/0x310\n  walk_pud_range+0x167/0x240\n  walk_pgd_range+0x55/0x100\n  __walk_page_range+0x87/0x90\n  walk_page_range+0xf6/0x160\n  hmm_range_fault+0x4f/0x90\n  amdgpu_hmm_range_get_pages+0x123/0x230 [amdgpu]\n  amdgpu_ttm_tt_get_user_pages+0xb1/0x150 [amdgpu]\n  init_user_pages+0xb1/0x2a0 [amdgpu]\n  amdgpu_amdkfd_gpuvm_alloc_memory_of_gpu+0x543/0x7d0 [amdgpu]\n  kfd_ioctl_alloc_memory_of_gpu+0x24c/0x4e0 [amdgpu]\n  kfd_ioctl+0x29d/0x500 [amdgpu]\n\n(cherry picked from commit a29e067bd38946f752b0ef855f3dfff87e77bec7)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38519",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/bd225b9591442065beb876da72656f4a2d627d03",
          "name" : "https://git.kernel.org/stable/c/bd225b9591442065beb876da72656f4a2d627d03",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ca4bb9ac706f05ead8ac1cce7b8245fc0645a687",
          "name" : "https://git.kernel.org/stable/c/ca4bb9ac706f05ead8ac1cce7b8245fc0645a687",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/damon: fix divide by zero in damon_get_intervals_score()\n\nThe current implementation allows having zero size regions with no special\nreasons, but damon_get_intervals_score() gets crashed by divide by zero\nwhen the region size is zero.\n\n  [   29.403950] Oops: divide error: 0000 [#1] SMP NOPTI\n\nThis patch fixes the bug, but does not disallow zero size regions to keep\nthe backward compatibility since disallowing zero size regions might be a\nbreaking change for some users.\n\nIn addition, the same crash can happen when intervals_goal.access_bp is\nzero so this should be fixed in stable trees as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38518",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/357f121517924e3ec3021f9d0dd0189adcd09867",
          "name" : "https://git.kernel.org/stable/c/357f121517924e3ec3021f9d0dd0189adcd09867",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a74bb5f202dabddfea96abc1328fcedae8aa140a",
          "name" : "https://git.kernel.org/stable/c/a74bb5f202dabddfea96abc1328fcedae8aa140a",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/CPU/AMD: Disable INVLPGB on Zen2\n\nAMD Cyan Skillfish (Family 17h, Model 47h, Stepping 0h) has an issue\nthat causes system oopses and panics when performing TLB flush using\nINVLPGB.\n\nHowever, the problem is that that machine has misconfigured CPUID and\nshould not report the INVLPGB bit in the first place. So zap the\nkernel's representation of the flag so that nothing gets confused.\n\n  [ bp: Massage. ]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38517",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/22bf79c0c2301b6e15a688220284b147774d277e",
          "name" : "https://git.kernel.org/stable/c/22bf79c0c2301b6e15a688220284b147774d277e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/99af22cd34688cc0d535a1919e0bea4cbc6c1ea1",
          "name" : "https://git.kernel.org/stable/c/99af22cd34688cc0d535a1919e0bea4cbc6c1ea1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/febc0b5dbabda414565bdfaaaa59d26f787d5fe7",
          "name" : "https://git.kernel.org/stable/c/febc0b5dbabda414565bdfaaaa59d26f787d5fe7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nlib/alloc_tag: do not acquire non-existent lock in alloc_tag_top_users()\n\nalloc_tag_top_users() attempts to lock alloc_tag_cttype->mod_lock even\nwhen the alloc_tag_cttype is not allocated because:\n\n  1) alloc tagging is disabled because mem profiling is disabled\n     (!alloc_tag_cttype)\n  2) alloc tagging is enabled, but not yet initialized (!alloc_tag_cttype)\n  3) alloc tagging is enabled, but failed initialization\n     (!alloc_tag_cttype or IS_ERR(alloc_tag_cttype))\n\nIn all cases, alloc_tag_cttype is not allocated, and therefore\nalloc_tag_top_users() should not attempt to acquire the semaphore.\n\nThis leads to a crash on memory allocation failure by attempting to\nacquire a non-existent semaphore:\n\n  Oops: general protection fault, probably for non-canonical address 0xdffffc000000001b: 0000 [#3] SMP KASAN NOPTI\n  KASAN: null-ptr-deref in range [0x00000000000000d8-0x00000000000000df]\n  CPU: 2 UID: 0 PID: 1 Comm: systemd Tainted: G      D             6.16.0-rc2 #1 VOLUNTARY\n  Tainted: [D]=DIE\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.2-debian-1.16.2-1 04/01/2014\n  RIP: 0010:down_read_trylock+0xaa/0x3b0\n  Code: d0 7c 08 84 d2 0f 85 a0 02 00 00 8b 0d df 31 dd 04 85 c9 75 29 48 b8 00 00 00 00 00 fc ff df 48 8d 6b 68 48 89 ea 48 c1 ea 03 <80> 3c 02 00 0f 85 88 02 00 00 48 3b 5b 68 0f 85 53 01 00 00 65 ff\n  RSP: 0000:ffff8881002ce9b8 EFLAGS: 00010016\n  RAX: dffffc0000000000 RBX: 0000000000000070 RCX: 0000000000000000\n  RDX: 000000000000001b RSI: 000000000000000a RDI: 0000000000000070\n  RBP: 00000000000000d8 R08: 0000000000000001 R09: ffffed107dde49d1\n  R10: ffff8883eef24e8b R11: ffff8881002cec20 R12: 1ffff11020059d37\n  R13: 00000000003fff7b R14: ffff8881002cec20 R15: dffffc0000000000\n  FS:  00007f963f21d940(0000) GS:ffff888458ca6000(0000) knlGS:0000000000000000\n  CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n  CR2: 00007f963f5edf71 CR3: 000000010672c000 CR4: 0000000000350ef0\n  Call Trace:\n   <TASK>\n   codetag_trylock_module_list+0xd/0x20\n   alloc_tag_top_users+0x369/0x4b0\n   __show_mem+0x1cd/0x6e0\n   warn_alloc+0x2b1/0x390\n   __alloc_frozen_pages_noprof+0x12b9/0x21a0\n   alloc_pages_mpol+0x135/0x3e0\n   alloc_slab_page+0x82/0xe0\n   new_slab+0x212/0x240\n   ___slab_alloc+0x82a/0xe00\n   </TASK>\n\nAs David Wang points out, this issue became easier to trigger after commit\n780138b12381 (\"alloc_tag: check mem_profiling_support in alloc_tag_init\").\n\nBefore the commit, the issue occurred only when it failed to allocate and\ninitialize alloc_tag_cttype or if a memory allocation fails before\nalloc_tag_init() is called.  After the commit, it can be easily triggered\nwhen memory profiling is compiled but disabled at boot.\n\nTo properly determine whether alloc_tag_init() has been called and its\ndata structures initialized, verify that alloc_tag_cttype is a valid\npointer before acquiring the semaphore.  If the variable is NULL or an\nerror value, it has not been properly initialized.  In such a case, just\nskip and do not attempt to acquire the semaphore.\n\n[harry.yoo@oracle.com: v3]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38516",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1d57f7132662e96aace3b8a000616efde289aae1",
          "name" : "https://git.kernel.org/stable/c/1d57f7132662e96aace3b8a000616efde289aae1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/275605a8b48002fe98675a5c06f3e39c09067ff2",
          "name" : "https://git.kernel.org/stable/c/275605a8b48002fe98675a5c06f3e39c09067ff2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/3f8fc02c2582c1dfad1785e9c7bc8b4e1521af0a",
          "name" : "https://git.kernel.org/stable/c/3f8fc02c2582c1dfad1785e9c7bc8b4e1521af0a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6a89563ccf9cd0d745e2291302878a061508573f",
          "name" : "https://git.kernel.org/stable/c/6a89563ccf9cd0d745e2291302878a061508573f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/93712205ce2f1fb047739494c0399a26ea4f0890",
          "name" : "https://git.kernel.org/stable/c/93712205ce2f1fb047739494c0399a26ea4f0890",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/97c9c7daeeb00c6e1d5e84084041f79c2d2dce22",
          "name" : "https://git.kernel.org/stable/c/97c9c7daeeb00c6e1d5e84084041f79c2d2dce22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cb4b08a095b1fa4b3fca782757517e4e9a917d8e",
          "name" : "https://git.kernel.org/stable/c/cb4b08a095b1fa4b3fca782757517e4e9a917d8e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cc145e02d6b8494c48f91958d52fa76b7e577f7b",
          "name" : "https://git.kernel.org/stable/c/cc145e02d6b8494c48f91958d52fa76b7e577f7b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\npinctrl: qcom: msm: mark certain pins as invalid for interrupts\n\nOn some platforms, the UFS-reset pin has no interrupt logic in TLMM but\nis nevertheless registered as a GPIO in the kernel. This enables the\nuser-space to trigger a BUG() in the pinctrl-msm driver by running, for\nexample: `gpiomon -c 0 113` on RB2.\n\nThe exact culprit is requesting pins whose intr_detection_width setting\nis not 1 or 2 for interrupts. This hits a BUG() in\nmsm_gpio_irq_set_type(). Potentially crashing the kernel due to an\ninvalid request from user-space is not optimal, so let's go through the\npins and mark those that would fail the check as invalid for the irq chip\nas we should not even register them as available irqs.\n\nThis function can be extended if we determine that there are more\ncorner-cases like this."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38515",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/549a9c78c3ea6807d0dc4162a4f5ba59f217d5a0",
          "name" : "https://git.kernel.org/stable/c/549a9c78c3ea6807d0dc4162a4f5ba59f217d5a0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee",
          "name" : "https://git.kernel.org/stable/c/8af39ec5cf2be522c8eb43a3d8005ed59e4daaee",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c64f5310530baf75328292f9b9f3f2961d185183",
          "name" : "https://git.kernel.org/stable/c/c64f5310530baf75328292f9b9f3f2961d185183",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e2d6547dc8b9b332f9bc00875197287a6a4db65a",
          "name" : "https://git.kernel.org/stable/c/e2d6547dc8b9b332f9bc00875197287a6a4db65a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e62f51d0ec8a9baf324caf9a564f8e318d36a551",
          "name" : "https://git.kernel.org/stable/c/e62f51d0ec8a9baf324caf9a564f8e318d36a551",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ef58a95457466849fa7b31fd3953801a5af0f58b",
          "name" : "https://git.kernel.org/stable/c/ef58a95457466849fa7b31fd3953801a5af0f58b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ef841f8e4e1ff67817ca899bedc5ebb00847c0a7",
          "name" : "https://git.kernel.org/stable/c/ef841f8e4e1ff67817ca899bedc5ebb00847c0a7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f9a4f28a4fc4ee453a92a9abbe36e26224d17749",
          "name" : "https://git.kernel.org/stable/c/f9a4f28a4fc4ee453a92a9abbe36e26224d17749",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/sched: Increment job count before swapping tail spsc queue\n\nA small race exists between spsc_queue_push and the run-job worker, in\nwhich spsc_queue_push may return not-first while the run-job worker has\nalready idled due to the job count being zero. If this race occurs, job\nscheduling stops, leading to hangs while waiting on the job’s DMA\nfences.\n\nSeal this race by incrementing the job count before appending to the\nSPSC queue.\n\nThis race was observed on a drm-tip 6.16-rc1 build with the Xe driver in\nan SVM test case."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38514",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0eef29385d715d4c7fd707b18d4a9b76c76dd5e6",
          "name" : "https://git.kernel.org/stable/c/0eef29385d715d4c7fd707b18d4a9b76c76dd5e6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2c2e9ebeb036f9b1b09325ec5cfdfe0e78f357c3",
          "name" : "https://git.kernel.org/stable/c/2c2e9ebeb036f9b1b09325ec5cfdfe0e78f357c3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/880a88f318cf1d2a0f4c0a7ff7b07e2062b434a4",
          "name" : "https://git.kernel.org/stable/c/880a88f318cf1d2a0f4c0a7ff7b07e2062b434a4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bf0ca6a1bc4fb904b598137c6718785a107e3adf",
          "name" : "https://git.kernel.org/stable/c/bf0ca6a1bc4fb904b598137c6718785a107e3adf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d1ff5f9d2c5405681457262e23c720b08977c11f",
          "name" : "https://git.kernel.org/stable/c/d1ff5f9d2c5405681457262e23c720b08977c11f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/efc1b2b7c1a308b60df8f36bc2d7ce16d3999364",
          "name" : "https://git.kernel.org/stable/c/efc1b2b7c1a308b60df8f36bc2d7ce16d3999364",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f5e72b7824d08c206ce106d30cb37c4642900ccc",
          "name" : "https://git.kernel.org/stable/c/f5e72b7824d08c206ce106d30cb37c4642900ccc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f7afb3ff01c42c49e8a143cdce400b95844bb506",
          "name" : "https://git.kernel.org/stable/c/f7afb3ff01c42c49e8a143cdce400b95844bb506",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nrxrpc: Fix oops due to non-existence of prealloc backlog struct\n\nIf an AF_RXRPC service socket is opened and bound, but calls are\npreallocated, then rxrpc_alloc_incoming_call() will oops because the\nrxrpc_backlog struct doesn't get allocated until the first preallocation is\nmade.\n\nFix this by returning NULL from rxrpc_alloc_incoming_call() if there is no\nbacklog struct.  This will cause the incoming call to be aborted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38513",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047",
          "name" : "https://git.kernel.org/stable/c/014c34dc132015c4f918ada4982e952947ac1047",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298",
          "name" : "https://git.kernel.org/stable/c/5420de65efbeb6503bcf1d43451c9df67ad60298",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d",
          "name" : "https://git.kernel.org/stable/c/602b4eb2f25668de15de69860ec99caf65b3684d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023",
          "name" : "https://git.kernel.org/stable/c/74b1ec9f5d627d2bdd5e5b6f3f81c23317657023",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae",
          "name" : "https://git.kernel.org/stable/c/adf08c96b963c7cd7ec1ee1c0c556228d9bedaae",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc",
          "name" : "https://git.kernel.org/stable/c/b24f65c184540dfb967479320ecf7e8c2e9220dc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0",
          "name" : "https://git.kernel.org/stable/c/c1958270de947604cc6de05fc96dbba256b49cf0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda",
          "name" : "https://git.kernel.org/stable/c/fcd9c923b58e86501450b9b442ccc7ce4a8d0fda",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: zd1211rw: Fix potential NULL pointer dereference in zd_mac_tx_to_dev()\n\nThere is a potential NULL pointer dereference in zd_mac_tx_to_dev(). For\nexample, the following is possible:\n\n    \tT0\t\t\t    \t\tT1\nzd_mac_tx_to_dev()\n  /* len == skb_queue_len(q) */\n  while (len > ZD_MAC_MAX_ACK_WAITERS) {\n\n\t\t\t\t\t  filter_ack()\n\t\t\t\t\t    spin_lock_irqsave(&q->lock, flags);\n\t\t\t\t\t    /* position == skb_queue_len(q) */\n\t\t\t\t\t    for (i=1; i<position; i++)\n\t\t\t\t    \t      skb = __skb_dequeue(q)\n\n\t\t\t\t\t    if (mac->type == NL80211_IFTYPE_AP)\n\t\t\t\t\t      skb = __skb_dequeue(q);\n\t\t\t\t\t    spin_unlock_irqrestore(&q->lock, flags);\n\n    skb_dequeue() -> NULL\n\nSince there is a small gap between checking skb queue length and skb being\nunconditionally dequeued in zd_mac_tx_to_dev(), skb_dequeue() can return NULL.\nThen the pointer is passed to zd_mac_tx_status() where it is dereferenced.\n\nIn order to avoid potential NULL pointer dereference due to situations like\nabove, check if skb is not NULL before passing it to zd_mac_tx_status().\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38512",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/6e3b09402cc6c3e3474fa548e8adf6897dda05de",
          "name" : "https://git.kernel.org/stable/c/6e3b09402cc6c3e3474fa548e8adf6897dda05de",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/737bb912ebbe4571195c56eba557c4d7315b26fb",
          "name" : "https://git.kernel.org/stable/c/737bb912ebbe4571195c56eba557c4d7315b26fb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e01851f6e9a665a6011b14714b271d3e6b0b8d32",
          "name" : "https://git.kernel.org/stable/c/e01851f6e9a665a6011b14714b271d3e6b0b8d32",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e2c8a3c0388aef6bfc4aabfba07bc7dff16eea80",
          "name" : "https://git.kernel.org/stable/c/e2c8a3c0388aef6bfc4aabfba07bc7dff16eea80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ec6392061de6681148b63ee6c8744da833498cdd",
          "name" : "https://git.kernel.org/stable/c/ec6392061de6681148b63ee6c8744da833498cdd",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: prevent A-MSDU attacks in mesh networks\n\nThis patch is a mitigation to prevent the A-MSDU spoofing vulnerability\nfor mesh networks. The initial update to the IEEE 802.11 standard, in\nresponse to the FragAttacks, missed this case (CVE-2025-27558). It can\nbe considered a variant of CVE-2020-24588 but for mesh networks.\n\nThis patch tries to detect if a standard MSDU was turned into an A-MSDU\nby an adversary. This is done by parsing a received A-MSDU as a standard\nMSDU, calculating the length of the Mesh Control header, and seeing if\nthe 6 bytes after this header equal the start of an rfc1042 header. If\nequal, this is a strong indication of an ongoing attack attempt.\n\nThis defense was tested with mac80211_hwsim against a mesh network that\nuses an empty Mesh Address Extension field, i.e., when four addresses\nare used, and when using a 12-byte Mesh Address Extension field, i.e.,\nwhen six addresses are used. Functionality of normal MSDUs and A-MSDUs\nwas also tested, and confirmed working, when using both an empty and\n12-byte Mesh Address Extension field.\n\nIt was also tested with mac80211_hwsim that A-MSDU attacks in non-mesh\nnetworks keep being detected and prevented.\n\nNote that the vulnerability being patched, and the defense being\nimplemented, was also discussed in the following paper and in the\nfollowing IEEE 802.11 presentation:\n\nhttps://papers.mathyvanhoef.com/wisec2025.pdf\nhttps://mentor.ieee.org/802.11/dcn/25/11-25-0949-00-000m-a-msdu-mesh-spoof-protection.docx"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38511",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5d21892c2e15b6a27f8bc907693eca7c6b7cc269",
          "name" : "https://git.kernel.org/stable/c/5d21892c2e15b6a27f8bc907693eca7c6b7cc269",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/705a412a367f383430fa34bada387af2e52eb043",
          "name" : "https://git.kernel.org/stable/c/705a412a367f383430fa34bada387af2e52eb043",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ff4b8c9ade1b82979fdd01e6f45b60f92eed26d8",
          "name" : "https://git.kernel.org/stable/c/ff4b8c9ade1b82979fdd01e6f45b60f92eed26d8",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/xe/pf: Clear all LMTT pages on alloc\n\nOur LMEM buffer objects are not cleared by default on alloc\nand during VF provisioning we only setup LMTT PTEs for the\nactually provisioned LMEM range. But beyond that valid range\nwe might leave some stale data that could either point to some\nother VFs allocations or even to the PF pages.\n\nExplicitly clear all new LMTT page to avoid the risk that a\nmalicious VF would try to exploit that gap.\n\nWhile around add asserts to catch any undesired PTE overwrites\nand low-level debug traces to track LMTT PT life-cycle.\n\n(cherry picked from commit 3fae6918a3e27cce20ded2551f863fb05d4bef8d)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38510",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0c3566d831def922cd56322c772a7b20d8b0e0c0",
          "name" : "https://git.kernel.org/stable/c/0c3566d831def922cd56322c772a7b20d8b0e0c0",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/2d89dab1ea6086e6cbe6fe92531b496fb6808cb9",
          "name" : "https://git.kernel.org/stable/c/2d89dab1ea6086e6cbe6fe92531b496fb6808cb9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/595f78d99b9051600233c0a5c4c47e1097e6ed01",
          "name" : "https://git.kernel.org/stable/c/595f78d99b9051600233c0a5c4c47e1097e6ed01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6ee9b3d84775944fb8c8a447961cd01274ac671c",
          "name" : "https://git.kernel.org/stable/c/6ee9b3d84775944fb8c8a447961cd01274ac671c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8377d7744bdce5c4b3f1b58924eebd3fdc078dfc",
          "name" : "https://git.kernel.org/stable/c/8377d7744bdce5c4b3f1b58924eebd3fdc078dfc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nkasan: remove kasan_find_vm_area() to prevent possible deadlock\n\nfind_vm_area() couldn't be called in atomic_context.  If find_vm_area() is\ncalled to reports vm area information, kasan can trigger deadlock like:\n\nCPU0                                CPU1\nvmalloc();\n alloc_vmap_area();\n  spin_lock(&vn->busy.lock)\n                                    spin_lock_bh(&some_lock);\n   <interrupt occurs>\n   <in softirq>\n   spin_lock(&some_lock);\n                                    <access invalid address>\n                                    kasan_report();\n                                     print_report();\n                                      print_address_description();\n                                       kasan_find_vm_area();\n                                        find_vm_area();\n                                         spin_lock(&vn->busy.lock) // deadlock!\n\nTo prevent possible deadlock while kasan reports, remove kasan_find_vm_area()."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38509",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/18eca59a04500b68a90e0c5c873f97c9d1ea2bfa",
          "name" : "https://git.kernel.org/stable/c/18eca59a04500b68a90e0c5c873f97c9d1ea2bfa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/58fcb1b4287ce38850402bb2bb16d09bf77b91d9",
          "name" : "https://git.kernel.org/stable/c/58fcb1b4287ce38850402bb2bb16d09bf77b91d9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: reject VHT opmode for unsupported channel widths\n\nVHT operating mode notifications are not defined for channel widths\nbelow 20 MHz. In particular, 5 MHz and 10 MHz are not valid under the\nVHT specification and must be rejected.\n\nWithout this check, malformed notifications using these widths may\nreach ieee80211_chan_width_to_rx_bw(), leading to a WARN_ON due to\ninvalid input. This issue was reported by syzbot.\n\nReject these unsupported widths early in sta_link_apply_parameters()\nwhen opmode_notif is used. The accepted set includes 20, 40, 80, 160,\nand 80+80 MHz, which are valid for VHT. While 320 MHz is not defined\nfor VHT, it is allowed to avoid rejecting HE or EHT clients that may\nstill send a VHT opmode notification."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38508",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/52e1a03e6cf61ae165f59f41c44394a653a0a788",
          "name" : "https://git.kernel.org/stable/c/52e1a03e6cf61ae165f59f41c44394a653a0a788",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d0195c42e65805938c9eb507657e7cdf8e1e9522",
          "name" : "https://git.kernel.org/stable/c/d0195c42e65805938c9eb507657e7cdf8e1e9522",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/sev: Use TSC_FACTOR for Secure TSC frequency calculation\n\nWhen using Secure TSC, the GUEST_TSC_FREQ MSR reports a frequency based on\nthe nominal P0 frequency, which deviates slightly (typically ~0.2%) from\nthe actual mean TSC frequency due to clocking parameters.\n\nOver extended VM uptime, this discrepancy accumulates, causing clock skew\nbetween the hypervisor and a SEV-SNP VM, leading to early timer interrupts as\nperceived by the guest.\n\nThe guest kernel relies on the reported nominal frequency for TSC-based\ntimekeeping, while the actual frequency set during SNP_LAUNCH_START may\ndiffer. This mismatch results in inaccurate time calculations, causing the\nguest to perceive hrtimers as firing earlier than expected.\n\nUtilize the TSC_FACTOR from the SEV firmware's secrets page (see \"Secrets\nPage Format\" in the SNP Firmware ABI Specification) to calculate the mean\nTSC frequency, ensuring accurate timekeeping and mitigating clock skew in\nSEV-SNP VMs.\n\nUse early_ioremap_encrypted() to map the secrets page as\nioremap_encrypted() uses kmalloc() which is not available during early TSC\ninitialization and causes a panic.\n\n  [ bp: Drop the silly dummy var:\n    https://lore.kernel.org/r/20250630192726.GBaGLlHl84xIopx4Pt@fat_crate.local ]"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38507",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/4a0381080397e77792a5168069f174d3e56175ff",
          "name" : "https://git.kernel.org/stable/c/4a0381080397e77792a5168069f174d3e56175ff",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/72cb7eef06a5cde42b324dea85fa11fd5bb6a08a",
          "name" : "https://git.kernel.org/stable/c/72cb7eef06a5cde42b324dea85fa11fd5bb6a08a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7b4a026313529a487821ef6ab494a61f12c1db08",
          "name" : "https://git.kernel.org/stable/c/7b4a026313529a487821ef6ab494a61f12c1db08",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: nintendo: avoid bluetooth suspend/resume stalls\n\nEnsure we don't stall or panic the kernel when using bluetooth-connected\ncontrollers. This was reported as an issue on android devices using\nkernel 6.6 due to the resume hook which had been added for usb joycons.\n\nFirst, set a new state value to JOYCON_CTLR_STATE_SUSPENDED in a\nnewly-added nintendo_hid_suspend. This makes sure we will not stall out\nthe kernel waiting for input reports during led classdev suspend. The\nstalls could happen if connectivity is unreliable or lost to the\ncontroller prior to suspend.\n\nSecond, since we lose connectivity during suspend, do not try\njoycon_init() for bluetooth controllers in the nintendo_hid_resume path.\n\nTested via multiple suspend/resume flows when using the controller both\nin USB and bluetooth modes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38506",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/1ef45ae7a3938f0844032ba670b4f89180a5bffc",
          "name" : "https://git.kernel.org/stable/c/1ef45ae7a3938f0844032ba670b4f89180a5bffc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/47bb584237cc285e3a860b70c01f7bda9dcfb05b",
          "name" : "https://git.kernel.org/stable/c/47bb584237cc285e3a860b70c01f7bda9dcfb05b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/d9bd1163c8d8f716f45e54d034ee28757cc85549",
          "name" : "https://git.kernel.org/stable/c/d9bd1163c8d8f716f45e54d034ee28757cc85549",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Allow CPU to reschedule while setting per-page memory attributes\n\nWhen running an SEV-SNP guest with a sufficiently large amount of memory (1TB+),\nthe host can experience CPU soft lockups when running an operation in\nkvm_vm_set_mem_attributes() to set memory attributes on the whole\nrange of guest memory.\n\nwatchdog: BUG: soft lockup - CPU#8 stuck for 26s! [qemu-kvm:6372]\nCPU: 8 UID: 0 PID: 6372 Comm: qemu-kvm Kdump: loaded Not tainted 6.15.0-rc7.20250520.el9uek.rc1.x86_64 #1 PREEMPT(voluntary)\nHardware name: Oracle Corporation ORACLE SERVER E4-2c/Asm,MB Tray,2U,E4-2c, BIOS 78016600 11/13/2024\nRIP: 0010:xas_create+0x78/0x1f0\nCode: 00 00 00 41 80 fc 01 0f 84 82 00 00 00 ba 06 00 00 00 bd 06 00 00 00 49 8b 45 08 4d 8d 65 08 41 39 d6 73 20 83 ed 06 48 85 c0 <74> 67 48 89 c2 83 e2 03 48 83 fa 02 75 0c 48 3d 00 10 00 00 0f 87\nRSP: 0018:ffffad890a34b940 EFLAGS: 00000286\nRAX: ffff96f30b261daa RBX: ffffad890a34b9c8 RCX: 0000000000000000\nRDX: 000000000000001e RSI: 0000000000000000 RDI: 0000000000000000\nRBP: 0000000000000018 R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000000 R12: ffffad890a356868\nR13: ffffad890a356860 R14: 0000000000000000 R15: ffffad890a356868\nFS:  00007f5578a2a400(0000) GS:ffff97ed317e1000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f015c70fb18 CR3: 00000001109fd006 CR4: 0000000000f70ef0\nPKRU: 55555554\nCall Trace:\n <TASK>\n xas_store+0x58/0x630\n __xa_store+0xa5/0x130\n xa_store+0x2c/0x50\n kvm_vm_set_mem_attributes+0x343/0x710 [kvm]\n kvm_vm_ioctl+0x796/0xab0 [kvm]\n __x64_sys_ioctl+0xa3/0xd0\n do_syscall_64+0x8c/0x7a0\n entry_SYSCALL_64_after_hwframe+0x76/0x7e\nRIP: 0033:0x7f5578d031bb\nCode: ff ff ff 85 c0 79 9b 49 c7 c4 ff ff ff ff 5b 5d 4c 89 e0 41 5c c3 66 0f 1f 84 00 00 00 00 00 f3 0f 1e fa b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 2d 4c 0f 00 f7 d8 64 89 01 48\nRSP: 002b:00007ffe0a742b88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 000000004020aed2 RCX: 00007f5578d031bb\nRDX: 00007ffe0a742c80 RSI: 000000004020aed2 RDI: 000000000000000b\nRBP: 0000010000000000 R08: 0000010000000000 R09: 0000017680000000\nR10: 0000000000000080 R11: 0000000000000246 R12: 00005575e5f95120\nR13: 00007ffe0a742c80 R14: 0000000000000008 R15: 00005575e5f961e0\n\nWhile looping through the range of memory setting the attributes,\ncall cond_resched() to give the scheduler a chance to run a higher\npriority task on the runqueue if necessary and avoid staying in\nkernel mode long enough to trigger the lockup."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38505",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/3b602ddc0df723992721b0d286c90c9bdd755b34",
          "name" : "https://git.kernel.org/stable/c/3b602ddc0df723992721b0d286c90c9bdd755b34",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/52654cebaac23dae31a9c97ae0da5be649f1ab4d",
          "name" : "https://git.kernel.org/stable/c/52654cebaac23dae31a9c97ae0da5be649f1ab4d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a963819a121f5dd61e0b39934d8b5dec529da96a",
          "name" : "https://git.kernel.org/stable/c/a963819a121f5dd61e0b39934d8b5dec529da96a",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mwifiex: discard erroneous disassoc frames on STA interface\n\nWhen operating in concurrent STA/AP mode with host MLME enabled,\nthe firmware incorrectly sends disassociation frames to the STA\ninterface when clients disconnect from the AP interface.\nThis causes kernel warnings as the STA interface processes\ndisconnect events that don't apply to it:\n\n[ 1303.240540] WARNING: CPU: 0 PID: 513 at net/wireless/mlme.c:141 cfg80211_process_disassoc+0x78/0xec [cfg80211]\n[ 1303.250861] Modules linked in: 8021q garp stp mrp llc rfcomm bnep btnxpuart nls_iso8859_1 nls_cp437 onboard_us\n[ 1303.327651] CPU: 0 UID: 0 PID: 513 Comm: kworker/u9:2 Not tainted 6.16.0-rc1+ #3 PREEMPT\n[ 1303.335937] Hardware name: Toradex Verdin AM62 WB on Verdin Development Board (DT)\n[ 1303.343588] Workqueue: MWIFIEX_RX_WORK_QUEUE mwifiex_rx_work_queue [mwifiex]\n[ 1303.350856] pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n[ 1303.357904] pc : cfg80211_process_disassoc+0x78/0xec [cfg80211]\n[ 1303.364065] lr : cfg80211_process_disassoc+0x70/0xec [cfg80211]\n[ 1303.370221] sp : ffff800083053be0\n[ 1303.373590] x29: ffff800083053be0 x28: 0000000000000000 x27: 0000000000000000\n[ 1303.380855] x26: 0000000000000000 x25: 00000000ffffffff x24: ffff000002c5b8ae\n[ 1303.388120] x23: ffff000002c5b884 x22: 0000000000000001 x21: 0000000000000008\n[ 1303.395382] x20: ffff000002c5b8ae x19: ffff0000064dd408 x18: 0000000000000006\n[ 1303.402646] x17: 3a36333a61623a30 x16: 32206d6f72662063 x15: ffff800080bfe048\n[ 1303.409910] x14: ffff000003625300 x13: 0000000000000001 x12: 0000000000000000\n[ 1303.417173] x11: 0000000000000002 x10: ffff000003958600 x9 : ffff000003625300\n[ 1303.424434] x8 : ffff00003fd9ef40 x7 : ffff0000039fc280 x6 : 0000000000000002\n[ 1303.431695] x5 : ffff0000038976d4 x4 : 0000000000000000 x3 : 0000000000003186\n[ 1303.438956] x2 : 000000004836ba20 x1 : 0000000000006986 x0 : 00000000d00479de\n[ 1303.446221] Call trace:\n[ 1303.448722]  cfg80211_process_disassoc+0x78/0xec [cfg80211] (P)\n[ 1303.454894]  cfg80211_rx_mlme_mgmt+0x64/0xf8 [cfg80211]\n[ 1303.460362]  mwifiex_process_mgmt_packet+0x1ec/0x460 [mwifiex]\n[ 1303.466380]  mwifiex_process_sta_rx_packet+0x1bc/0x2a0 [mwifiex]\n[ 1303.472573]  mwifiex_handle_rx_packet+0xb4/0x13c [mwifiex]\n[ 1303.478243]  mwifiex_rx_work_queue+0x158/0x198 [mwifiex]\n[ 1303.483734]  process_one_work+0x14c/0x28c\n[ 1303.487845]  worker_thread+0x2cc/0x3d4\n[ 1303.491680]  kthread+0x12c/0x208\n[ 1303.495014]  ret_from_fork+0x10/0x20\n\nAdd validation in the STA receive path to verify that disassoc/deauth\nframes originate from the connected AP. Frames that fail this check\nare discarded early, preventing them from reaching the MLME layer and\ntriggering WARN_ON().\n\nThis filtering logic is similar with that used in the\nieee80211_rx_mgmt_disassoc() function in mac80211, which drops\ndisassoc frames that don't match the current BSSID\n(!ether_addr_equal(mgmt->bssid, sdata->vif.cfg.ap_addr)), ensuring\nonly relevant frames are processed.\n\nTested on:\n- 8997 with FW 16.68.1.p197"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38504",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/203817de269539c062724d97dfa5af3cdf77a3ec",
          "name" : "https://git.kernel.org/stable/c/203817de269539c062724d97dfa5af3cdf77a3ec",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ad9f1b5bed082b9c910e2a24bae0286a70846909",
          "name" : "https://git.kernel.org/stable/c/ad9f1b5bed082b9c910e2a24bae0286a70846909",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nio_uring/zcrx: fix pp destruction warnings\n\nWith multiple page pools and in some other cases we can have allocated\nniovs on page pool destruction. Remove a misplaced warning checking that\nall niovs are returned to zcrx on io_pp_zc_destroy(). It was reported\nbefore but apparently got lost."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38503",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/0bcc14f36c7ad37121cf5c0ae18cdde5bfad9c4e",
          "name" : "https://git.kernel.org/stable/c/0bcc14f36c7ad37121cf5c0ae18cdde5bfad9c4e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/1961d20f6fa8903266ed9bd77c691924c22c8f02",
          "name" : "https://git.kernel.org/stable/c/1961d20f6fa8903266ed9bd77c691924c22c8f02",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6bbe6530b1db7b4365ce9e86144c18c5d73b2c5b",
          "name" : "https://git.kernel.org/stable/c/6bbe6530b1db7b4365ce9e86144c18c5d73b2c5b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7c77df23324f60bcff0ea44392e2c82e9486640c",
          "name" : "https://git.kernel.org/stable/c/7c77df23324f60bcff0ea44392e2c82e9486640c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f4428b2d4c68732653e93f748f538bdee639ff80",
          "name" : "https://git.kernel.org/stable/c/f4428b2d4c68732653e93f748f538bdee639ff80",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix assertion when building free space tree\n\nWhen building the free space tree with the block group tree feature\nenabled, we can hit an assertion failure like this:\n\n  BTRFS info (device loop0 state M): rebuilding free space tree\n  assertion failed: ret == 0, in fs/btrfs/free-space-tree.c:1102\n  ------------[ cut here ]------------\n  kernel BUG at fs/btrfs/free-space-tree.c:1102!\n  Internal error: Oops - BUG: 00000000f2000800 [#1]  SMP\n  Modules linked in:\n  CPU: 1 UID: 0 PID: 6592 Comm: syz-executor322 Not tainted 6.15.0-rc7-syzkaller-gd7fa1af5b33e #0 PREEMPT\n  Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025\n  pstate: 60400005 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102\n  lr : populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102\n  sp : ffff8000a4ce7600\n  x29: ffff8000a4ce76e0 x28: ffff0000c9bc6000 x27: ffff0000ddfff3d8\n  x26: ffff0000ddfff378 x25: dfff800000000000 x24: 0000000000000001\n  x23: ffff8000a4ce7660 x22: ffff70001499cecc x21: ffff0000e1d8c160\n  x20: ffff0000e1cb7800 x19: ffff0000e1d8c0b0 x18: 00000000ffffffff\n  x17: ffff800092f39000 x16: ffff80008ad27e48 x15: ffff700011e740c0\n  x14: 1ffff00011e740c0 x13: 0000000000000004 x12: ffffffffffffffff\n  x11: ffff700011e740c0 x10: 0000000000ff0100 x9 : 94ef24f55d2dbc00\n  x8 : 94ef24f55d2dbc00 x7 : 0000000000000001 x6 : 0000000000000001\n  x5 : ffff8000a4ce6f98 x4 : ffff80008f415ba0 x3 : ffff800080548ef0\n  x2 : 0000000000000000 x1 : 0000000100000000 x0 : 000000000000003e\n  Call trace:\n   populate_free_space_tree+0x514/0x518 fs/btrfs/free-space-tree.c:1102 (P)\n   btrfs_rebuild_free_space_tree+0x14c/0x54c fs/btrfs/free-space-tree.c:1337\n   btrfs_start_pre_rw_mount+0xa78/0xe10 fs/btrfs/disk-io.c:3074\n   btrfs_remount_rw fs/btrfs/super.c:1319 [inline]\n   btrfs_reconfigure+0x828/0x2418 fs/btrfs/super.c:1543\n   reconfigure_super+0x1d4/0x6f0 fs/super.c:1083\n   do_remount fs/namespace.c:3365 [inline]\n   path_mount+0xb34/0xde0 fs/namespace.c:4200\n   do_mount fs/namespace.c:4221 [inline]\n   __do_sys_mount fs/namespace.c:4432 [inline]\n   __se_sys_mount fs/namespace.c:4409 [inline]\n   __arm64_sys_mount+0x3e8/0x468 fs/namespace.c:4409\n   __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n   invoke_syscall+0x98/0x2b8 arch/arm64/kernel/syscall.c:49\n   el0_svc_common+0x130/0x23c arch/arm64/kernel/syscall.c:132\n   do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:151\n   el0_svc+0x58/0x17c arch/arm64/kernel/entry-common.c:767\n   el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:786\n   el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:600\n  Code: f0047182 91178042 528089c3 9771d47b (d4210000)\n  ---[ end trace 0000000000000000 ]---\n\nThis happens because we are processing an empty block group, which has\nno extents allocated from it, there are no items for this block group,\nincluding the block group item since block group items are stored in a\ndedicated tree when using the block group tree feature. It also means\nthis is the block group with the highest start offset, so there are no\nhigher keys in the extent root, hence btrfs_search_slot_for_read()\nreturns 1 (no higher key found).\n\nFix this by asserting 'ret' is 0 only if the block group tree feature\nis not enabled, in which case we should find a block group item for\nthe block group since it's stored in the extent root and block group\nitem keys are greater than extent item keys (the value for\nBTRFS_BLOCK_GROUP_ITEM_KEY is 192 and for BTRFS_EXTENT_ITEM_KEY and\nBTRFS_METADATA_ITEM_KEY the values are 168 and 169 respectively).\nIn case 'ret' is 1, we just need to add a record to the free space\ntree which spans the whole block group, and we can achieve this by\nmaking 'ret == 0' as the while loop's condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T11:15Z",
    "lastModifiedDate" : "2025-08-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38502",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/19341d5c59e8c7e8528e40f8663e99d67810473c",
          "name" : "https://git.kernel.org/stable/c/19341d5c59e8c7e8528e40f8663e99d67810473c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/abad3d0bad72a52137e0c350c59542d75ae4f513",
          "name" : "https://git.kernel.org/stable/c/abad3d0bad72a52137e0c350c59542d75ae4f513",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix oob access in cgroup local storage\n\nLonial reported that an out-of-bounds access in cgroup local storage\ncan be crafted via tail calls. Given two programs each utilizing a\ncgroup local storage with a different value size, and one program\ndoing a tail call into the other. The verifier will validate each of\nthe indivial programs just fine. However, in the runtime context\nthe bpf_cg_run_ctx holds an bpf_prog_array_item which contains the\nBPF program as well as any cgroup local storage flavor the program\nuses. Helpers such as bpf_get_local_storage() pick this up from the\nruntime context:\n\n  ctx = container_of(current->bpf_ctx, struct bpf_cg_run_ctx, run_ctx);\n  storage = ctx->prog_item->cgroup_storage[stype];\n\n  if (stype == BPF_CGROUP_STORAGE_SHARED)\n    ptr = &READ_ONCE(storage->buf)->data[0];\n  else\n    ptr = this_cpu_ptr(storage->percpu_buf);\n\nFor the second program which was called from the originally attached\none, this means bpf_get_local_storage() will pick up the former\nprogram's map, not its own. With mismatching sizes, this can result\nin an unintended out-of-bounds access.\n\nTo fix this issue, we need to extend bpf_map_owner with an array of\nstorage_cookie[] to match on i) the exact maps from the original\nprogram if the second program was using bpf_get_local_storage(), or\nii) allow the tail call combination if the second program was not\nusing any of the cgroup local storage maps."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T10:15Z",
    "lastModifiedDate" : "2025-08-16T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8719",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/translate-this-google-translate-web-element-shortcode/trunk/translate_this_plugin.php",
          "name" : "https://plugins.svn.wordpress.org/translate-this-google-translate-web-element-shortcode/trunk/translate_this_plugin.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/translate-this-google-translate-web-element-shortcode/#developers",
          "name" : "https://wordpress.org/plugins/translate-this-google-translate-web-element-shortcode/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7f1a21c-2de0-4f41-b61e-7c4742900762?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a7f1a21c-2de0-4f41-b61e-7c4742900762?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Translate This gTranslate Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘base_lang’ parameter in all versions up to, and including, 1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T09:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8464",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1018",
          "name" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1018",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1050",
          "name" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L1050",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L77",
          "name" : "https://plugins.trac.wordpress.org/browser/drag-and-drop-multiple-file-upload-contact-form-7/tags/1.3.9.0/inc/dnd-upload-cf7.php#L77",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&new=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&new=3344512%40drag-and-drop-multiple-file-upload-contact-form-7&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/17f7be7f-f675-4c9f-a7b3-525a3c3c5775?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/17f7be7f-f675-4c9f-a7b3-525a3c3c5775?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Drag and Drop Multiple File Upload for Contact Form 7 plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 1.3.9.0 via the wpcf7_guest_user_id cookie. This makes it possible for unauthenticated attackers to upload and delete files outside of the originally intended directory. The impact of this vulnerability is limited, as file types are validated and only safe ones can be uploaded, while deletion is limited to the plugin's uploads folder."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-16T08:15Z",
    "lastModifiedDate" : "2025-08-16T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7499",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/betterdocs/tags/4.1.0/includes/REST/DocCategories.php#L82",
          "name" : "https://plugins.trac.wordpress.org/browser/betterdocs/tags/4.1.0/includes/REST/DocCategories.php#L82",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3338384/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3338384/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5231b741-4d02-45b5-b2aa-0d9d3536a416?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5231b741-4d02-45b5-b2aa-0d9d3536a416?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BetterDocs – Advanced AI-Driven Documentation, FAQ & Knowledge Base Tool for Elementor & Gutenberg with Encyclopedia, AI Support, Instant Answers plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the get_response function in all versions up to and including 4.1.1. This makes it possible for unauthenticated attackers to retrieve passwords for password-protected documents as well as the metadata of private and draft documents."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-16T08:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8898",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3343878/ecab-taxi-booking-manager/trunk/inc/MPTBM_Rest_Api.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3343878/ecab-taxi-booking-manager/trunk/inc/MPTBM_Rest_Api.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/ecab-taxi-booking-manager/",
          "name" : "https://wordpress.org/plugins/ecab-taxi-booking-manager/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd50ac2c-3049-4a44-b7f8-a5f87c42555c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd50ac2c-3049-4a44-b7f8-a5f87c42555c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Taxi Booking Manager for Woocommerce | E-cab plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.3.0. This is due to the plugin not properly validating a user's capabilities prior to updating a plugin setting or their identity prior to updating their details like email address. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T07:15Z",
    "lastModifiedDate" : "2025-08-16T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8896",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344317%40profile-builder&new=3344317%40profile-builder&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344317%40profile-builder&new=3344317%40profile-builder&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d28e118-07d3-483e-87b8-66ccdb79e879?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d28e118-07d3-483e-87b8-66ccdb79e879?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The User Profile Builder – Beautiful User Registration Forms, User Profiles & User Role Editor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'gdpr_communication_preferences[]' parameter in all versions up to, and including, 3.14.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is only exploitable when the GDPR Communication Preferences module is enabled and at least one GDPR Communication Preferences field has been added to the edit profile form."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T07:15Z",
    "lastModifiedDate" : "2025-08-16T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8089",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/advanced-iframe/trunk/advanced-iframe.php#L1831",
          "name" : "https://plugins.trac.wordpress.org/browser/advanced-iframe/trunk/advanced-iframe.php#L1831",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344404%40advanced-iframe&new=3344404%40advanced-iframe&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3344404%40advanced-iframe&new=3344404%40advanced-iframe&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/97985b75-6ac9-4aba-8f76-5633418e7907?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/97985b75-6ac9-4aba-8f76-5633418e7907?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'additional' parameter in version less than, or equal to, 2025.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-16T07:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8113",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/752908b4-7d05-476f-8920-1d0e58fc2983/",
          "name" : "https://wpscan.com/vulnerability/752908b4-7d05-476f-8920-1d0e58fc2983/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/752908b4-7d05-476f-8920-1d0e58fc2983/",
          "name" : "https://wpscan.com/vulnerability/752908b4-7d05-476f-8920-1d0e58fc2983/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ebook Store WordPress plugin before 5.8015 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T06:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38501",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/6073afe64510c302b7a0683a01e32c012eff715d",
          "name" : "https://git.kernel.org/stable/c/6073afe64510c302b7a0683a01e32c012eff715d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/7e5d91d3e6c62a9755b36f29c35288f06c3cd86b",
          "name" : "https://git.kernel.org/stable/c/7e5d91d3e6c62a9755b36f29c35288f06c3cd86b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/cb092fc3a62972a4aa47c9fe356c2c6a01cd840b",
          "name" : "https://git.kernel.org/stable/c/cb092fc3a62972a4aa47c9fe356c2c6a01cd840b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/e6bb9193974059ddbb0ce7763fa3882bd60d4dc3",
          "name" : "https://git.kernel.org/stable/c/e6bb9193974059ddbb0ce7763fa3882bd60d4dc3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f1ce9258bcbce2491f9f71f7882b6eed0b33ec65",
          "name" : "https://git.kernel.org/stable/c/f1ce9258bcbce2491f9f71f7882b6eed0b33ec65",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fa1c47af4ff641cf9197ecdb1f8240cbb30389c1",
          "name" : "https://git.kernel.org/stable/c/fa1c47af4ff641cf9197ecdb1f8240cbb30389c1",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nksmbd: limit repeated connections from clients with the same IP\n\nRepeated connections from clients with the same IP address may exhaust\nthe max connections and prevent other normal client connections.\nThis patch limit repeated connections from clients with the same IP."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T06:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8293",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/intl-datetime-calendar/",
          "name" : "https://wordpress.org/plugins/intl-datetime-calendar/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc333949-de1e-493a-badd-3be1c9060503?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc333949-de1e-493a-badd-3be1c9060503?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Intl DateTime Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘date’ parameter in all versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7686",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/weichuncai/trunk/sm-options.php",
          "name" : "https://plugins.trac.wordpress.org/browser/weichuncai/trunk/sm-options.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe46ec14-4795-4ac7-afd0-de92ccef877d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fe46ec14-4795-4ac7-afd0-de92ccef877d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The weichuncai(WP???) plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.5. This is due to missing or incorrect nonce validation on the sm-options.php page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7684",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/lastfm-recent-album-artwork/trunk/lastfm_albums_artwork.php",
          "name" : "https://plugins.trac.wordpress.org/browser/lastfm-recent-album-artwork/trunk/lastfm_albums_artwork.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/lastfm-recent-album-artwork/",
          "name" : "https://wordpress.org/plugins/lastfm-recent-album-artwork/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf6671d-f481-4fe5-b966-2591ab76b0b5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3bf6671d-f481-4fe5-b966-2591ab76b0b5?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Last.fm Recent Album Artwork plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.2. This is due to missing or incorrect nonce validation on the 'lastfm_albums_artwork.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7683",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/latestcheckins/trunk/wzw-admin.php",
          "name" : "https://plugins.trac.wordpress.org/browser/latestcheckins/trunk/wzw-admin.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/latestcheckins/",
          "name" : "https://wordpress.org/plugins/latestcheckins/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b2b1500-04b6-40fb-8d1f-9c210f95788b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b2b1500-04b6-40fb-8d1f-9c210f95788b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The LatestCheckins plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1. This is due to missing or incorrect nonce validation on the 'LatestCheckins' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7668",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/linux-promotional-plugin/trunk/linux-promotional-plugin.php",
          "name" : "https://plugins.trac.wordpress.org/browser/linux-promotional-plugin/trunk/linux-promotional-plugin.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/linux-promotional-plugin/",
          "name" : "https://wordpress.org/plugins/linux-promotional-plugin/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a3e3d91-5ce5-4db1-856e-c1d12471f9ed?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a3e3d91-5ce5-4db1-856e-c1d12471f9ed?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Linux Promotional Plugin plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4. This is due to missing or incorrect nonce validation on the 'inux-promotional-plugin.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7664",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/alpack/trunk/includes/api.php",
          "name" : "https://plugins.trac.wordpress.org/browser/alpack/trunk/includes/api.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/alpack/#developers",
          "name" : "https://wordpress.org/plugins/alpack/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/793a2096-3332-412e-a45a-a7367b1209a3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/793a2096-3332-412e-a45a-a7367b1209a3?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AL Pack plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the check_activate_permission() permission callback for the /wp-json/presslearn/v1/activate REST API endpoint in all versions up to, and including, 1.0.2. The callback reads the client-supplied Origin header and, after parsing, allows the request if it matches one of the trusted domains, without ever verifying user authentication, capabilities, or nonce tokens. This makes it possible for unauthenticated attackers to activate premium features by simply spoofing the Origin header."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7651",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/earnware-connect/",
          "name" : "https://wordpress.org/plugins/earnware-connect/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/515557bf-da71-4076-89bb-ce970ea7befa?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/515557bf-da71-4076-89bb-ce970ea7befa?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Earnware Connect plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'ew_hasrole' shortcode in all versions up to, and including, 1.0.73 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7649",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/surbma-recent-comments-shortcode/tags/2.0/surbma-recent-comments-shortcode.php",
          "name" : "https://plugins.svn.wordpress.org/surbma-recent-comments-shortcode/tags/2.0/surbma-recent-comments-shortcode.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/58e9c535-1b36-4795-b8f6-b38f3fc3d164?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/58e9c535-1b36-4795-b8f6-b38f3fc3d164?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Surbma | Recent Comments Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'recent-comments' shortcode in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7441",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/story-chief/trunk/includes/tools.php#L75",
          "name" : "https://plugins.trac.wordpress.org/browser/story-chief/trunk/includes/tools.php#L75",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/979efaa4-10f1-4c7f-b4b0-5a41678c9d66?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/979efaa4-10f1-4c7f-b4b0-5a41678c9d66?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The StoryChief plugin for WordPress is vulnerable to arbitrary file uploads in all versions up to, and including, 1.0.42. This vulnerability occurs through the /wp-json/storychief/webhook REST-API endpoint that does not have sufficient filetype validation. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7440",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/anber-elementor-addon/",
          "name" : "https://wordpress.org/plugins/anber-elementor-addon/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/67b0f756-9130-402d-9787-78d482fa183e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/67b0f756-9130-402d-9787-78d482fa183e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $item['button_link']['url'] parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7439",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/anber-elementor-addon/",
          "name" : "https://wordpress.org/plugins/anber-elementor-addon/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb46d7fa-9667-4479-8136-837cb61eaf4c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb46d7fa-9667-4479-8136-837cb61eaf4c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Anber Elementor Addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the $anber_item['button_link']['url']’ parameter in all versions up to, and including, 1.0.1 to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6221",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/embed-bokun/trunk/embed-bokun.php#L226",
          "name" : "https://plugins.trac.wordpress.org/browser/embed-bokun/trunk/embed-bokun.php#L226",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/embed-bokun/#developers",
          "name" : "https://wordpress.org/plugins/embed-bokun/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2947a6e9-e357-4751-adfd-f9043bef75e9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2947a6e9-e357-4751-adfd-f9043bef75e9?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Embed Bokun plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘align’ parameter in all versions up to, and including, 0.23 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-16T04:16Z",
    "lastModifiedDate" : "2025-08-16T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6080",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964",
          "name" : "https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f853657-1801-4d63-89b8-b2132212a205?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f853657-1801-4d63-89b8-b2132212a205?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to unauthorized admin account creation in all versions up to, and including, 67.7.0. This is due to the plugin not properly validating a user's capabilities prior to adding users. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create new users, including admins."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T04:15Z",
    "lastModifiedDate" : "2025-08-16T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6079",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/school-management-system-for-wordpress/11470032",
          "name" : "https://codecanyon.net/item/school-management-system-for-wordpress/11470032",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d872ec33-6284-495c-b894-41fe7b40b63c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d872ec33-6284-495c-b894-41fe7b40b63c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System for Wordpress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the homework.php file in all versions up to, and including, 93.2.0. This makes it possible for authenticated attackers, with Student-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T04:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3671",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964",
          "name" : "https://codecanyon.net/item/-wpgym-wordpress-gym-management-system/13352964",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6536d19f-a042-4404-b0c9-91aacd7768f7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6536d19f-a042-4404-b0c9-91aacd7768f7?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPGYM - Wordpress Gym Management System plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 67.7.0 via the 'page' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The Local File Inclusion exploit can be chained to include various dashboard view files in the plugin. One in particular reported by the researcher can be leveraged to update the password of Super Administrator accounts in Multisite environments making privilege escalation possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T04:15Z",
    "lastModifiedDate" : "2025-08-16T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-8393",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/woolook/trunk/includes/views/panel.php",
          "name" : "https://plugins.trac.wordpress.org/browser/woolook/trunk/includes/views/panel.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf3916fc-f652-4615-872c-3f007b8999df?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf3916fc-f652-4615-872c-3f007b8999df?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Woocommerce Blocks – Woolook plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.7.0 via the via the 'tab' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. Please note that this can also be exploited via CSRF techniques."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-16T04:15Z",
    "lastModifiedDate" : "2025-08-16T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-12612",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/school-management-system-for-wordpress/11470032",
          "name" : "https://codecanyon.net/item/school-management-system-for-wordpress/11470032",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/258877a7-670c-4a3c-8107-47dc7ba6a5ed?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/258877a7-670c-4a3c-8107-47dc7ba6a5ed?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System for Wordpress plugin for WordPress is vulnerable to SQL Injection via several parameters across multiple AJAX action in all versions up to, and including, 93.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-16T04:15Z",
    "lastModifiedDate" : "2025-08-16T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49895",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/serverbuddy-by-pluginbuddy/vulnerability/wordpress-serverbuddy-by-pluginbuddy-com-plugin-1-0-5-csrf-to-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/serverbuddy-by-pluginbuddy/vulnerability/wordpress-serverbuddy-by-pluginbuddy-com-plugin-1-0-5-csrf-to-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in iThemes ServerBuddy by PluginBuddy.Com allows Object Injection.This issue affects ServerBuddy by PluginBuddy.Com: from n/a through 1.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T03:15Z",
    "lastModifiedDate" : "2025-08-16T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-12575",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3320686/poll-maker/tags/5.9.0/public/class-poll-maker-ays-public.php?old=3317469&old_path=poll-maker%2Ftags%2F5.8.9%2Fpublic%2Fclass-poll-maker-ays-public.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3320686/poll-maker/tags/5.9.0/public/class-poll-maker-ays-public.php?old=3317469&old_path=poll-maker%2Ftags%2F5.8.9%2Fpublic%2Fclass-poll-maker-ays-public.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3674cfb8-6372-4309-a9de-e6ef7c0b3836?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3674cfb8-6372-4309-a9de-e6ef7c0b3836?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to Basic Information Exposure in all versions up to, and including, 5.8.9 via the 'ays_finish_poll' AJAX action. This makes it possible for unauthenticated attackers to retrieve admin email information which is exposed in the poll response."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-16T03:15Z",
    "lastModifiedDate" : "2025-08-16T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55284",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/anthropics/claude-code/security/advisories/GHSA-x5gv-jw7f-j6xj",
          "name" : "https://github.com/anthropics/claude-code/security/advisories/GHSA-x5gv-jw7f-j6xj",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Claude Code is an agentic coding tool. Prior to version 1.0.4, it's possible to bypass the Claude Code confirmation prompts to read a file and then send file contents over the network without user confirmation due to an overly broad allowlist of safe commands. Reliably exploiting this requires the ability to add untrusted content into a Claude Code context window. Users on standard Claude Code auto-update received this fix automatically after release. Current users of Claude Code are unaffected, as versions prior to 1.0.24 are deprecated and have been forced to update."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T02:15Z",
    "lastModifiedDate" : "2025-08-16T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55286",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vancluever/z2d/commit/93e45d36af53cda0d7f454ed8440713b7ac155b6",
          "name" : "https://github.com/vancluever/z2d/commit/93e45d36af53cda0d7f454ed8440713b7ac155b6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vancluever/z2d/pull/137",
          "name" : "https://github.com/vancluever/z2d/pull/137",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vancluever/z2d/security/advisories/GHSA-2vq8-cp8r-vcf3",
          "name" : "https://github.com/vancluever/z2d/security/advisories/GHSA-2vq8-cp8r-vcf3",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "z2d is a pure Zig 2D graphics library. z2d v0.7.0 released with a new multi-sample anti-aliasing (MSAA) method, which uses a new buffering mechanism for storing coverage data. This differs from the standard alpha mask surface used for the previous super-sample anti-aliasing (SSAA) method. Under certain circumstances where the path being drawn existed in whole or partly outside of the rendering surface, incorrect bounding could cause out-of-bounds access within the coverage buffer. This affects the higher-level drawing operations, such as Context.fill, Context.stroke, painter.fill, and painter.stroke, when either the .default or .multisample_4x anti-aliasing modes were used. .supersample_4x was not affected, nor was drawing without anti-aliasing. In non-safe optimization modes (consumers compiling with ReleaseFast or ReleaseSmall), this could potentially lead to invalid memory accesses or corruption. z2d v0.7.1 fixes this issue, and it's recommended to upgrade to v0.7.1, or, given the small period of time v0.7.0 has been released, use v0.7.1 immediately, skipping v0.7.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T01:15Z",
    "lastModifiedDate" : "2025-08-16T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2017-20199",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/issues/92",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/issues/92",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-358449755",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-358449755",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-372991430",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-372991430",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/pull/89",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/pull/89",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/releases/tag/v1.0.1",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/releases/tag/v1.0.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319969",
          "name" : "VDB-319969 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319969",
          "name" : "VDB-319969 | Buttercup buttercup-browser-extension access control",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628170",
          "name" : "Submit #628170 | Buttercup Password Manager Buttercup Browser Extension <=v0.14.2 Improper Access Control – Sensitive Data Exposure (CWE-284 / CWE",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-372991430",
          "name" : "https://github.com/buttercup/buttercup-browser-extension/issues/92#issuecomment-372991430",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Buttercup buttercup-browser-extension up to 0.14.2. Affected by this vulnerability is an unknown functionality. The manipulation results in improper access controls. The attack may be performed from a remote location. A high complexity level is associated with this attack. The exploitation appears to be difficult. The exploit has been made public and could be used. Upgrading to version 1.0.1 addresses this issue. The patch is identified as 89. Upgrading the affected component is recommended. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-16T00:15Z",
    "lastModifiedDate" : "2025-08-18T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52621",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL BigFix SaaS Authentication Service is vulnerable to cache poisoning.   The BigFix SaaS's HTTP responses were observed to include the Origin header. Its presence alongside an unvalidated reflection of the Origin header value introduces a potential for cache poisoning."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T23:15Z",
    "lastModifiedDate" : "2025-08-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52620",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL BigFix SaaS Authentication Service is affected by a Cross-Site Scripting (XSS) vulnerability.  The image upload functionality inadequately validated the submitted image format."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T23:15Z",
    "lastModifiedDate" : "2025-08-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52619",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL BigFix SaaS Authentication Service is affected by a sensitive information disclosure.  Under certain conditions, error messages disclose sensitive version information about the underlying platform."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T23:15Z",
    "lastModifiedDate" : "2025-08-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52618",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123330",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL BigFix SaaS Authentication Service is affected by a SQL injection vulnerability.  The vulnerability allows potential attackers to manipulate SQL queries."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T23:15Z",
    "lastModifiedDate" : "2025-08-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43201",
        "ASSIGNER" : "product-security@apple.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.apple.com/en-us/124156",
          "name" : "https://support.apple.com/en-us/124156",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This issue was addressed with improved checks. This issue is fixed in Apple Music Classical 2.3 for Android. An app may be able to unexpectedly leak a user's credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T22:15Z",
    "lastModifiedDate" : "2025-08-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8959",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-23-hashicorp-go-getter-vulnerable-to-arbitrary-read-through-symlink-attack/76242",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-23-hashicorp-go-getter-vulnerable-to-arbitrary-read-through-symlink-attack/76242",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HashiCorp's go-getter library subdirectory download feature is vulnerable to symlink attacks leading to unauthorized read access beyond the designated directory boundaries. This vulnerability, identified as CVE-2025-8959, is fixed in go-getter 1.7.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T21:15Z",
    "lastModifiedDate" : "2025-08-15T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44201",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T21:15Z",
    "lastModifiedDate" : "2025-08-15T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36088",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242263",
          "name" : "https://www.ibm.com/support/pages/node/7242263",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM TS4500 1.11.0.0-D00, 1.11.0.1-C00, 1.11.0.2-C00, and 1.10.00-F00 web GUI is vulnerable to cross-site scripting. This vulnerability allows an authenticated user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T20:15Z",
    "lastModifiedDate" : "2025-08-15T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43490",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/us-en/document/ish_12893367-12893393-16/hpsbhf04044",
          "name" : "https://support.hp.com/us-en/document/ish_12893367-12893393-16/hpsbhf04044",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A potential security vulnerability has been identified in the HPAudioAnalytics service included in the HP Hotkey Support software, which might allow escalation of privilege. HP is releasing software updates to mitigate the potential vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T19:15Z",
    "lastModifiedDate" : "2025-08-15T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55285",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/backstage/backstage/commit/c371f6fe12371de31dca537510e6653e287cdc2e",
          "name" : "https://github.com/backstage/backstage/commit/c371f6fe12371de31dca537510e6653e287cdc2e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/backstage/backstage/security/advisories/GHSA-3x3q-ghcp-whf7",
          "name" : "https://github.com/backstage/backstage/security/advisories/GHSA-3x3q-ghcp-whf7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "@backstage/plugin-scaffolder-backend is the backend for the default Backstage software templates. Prior to version 2.1.1, duplicate logging of the input values in the fetch:template action in the Scaffolder meant that some of the secrets were not properly redacted. If ${{ secrets.x }} is not passed through to fetch:template there is no impact. This issue has been resolved in 2.1.1 of the scaffolder-backend plugin. A workaround for this issue involves Template Authors removing the use of ${{ secrets }} being used as an argument to fetch:template."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T18:15Z",
    "lastModifiedDate" : "2025-08-15T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9060",
        "ASSIGNER" : "vulnerability@kaspersky.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/klsecservices/Advisories/blob/master/K-MSoft-2025-002.md",
          "name" : "https://github.com/klsecservices/Advisories/blob/master/K-MSoft-2025-002.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in the  MSoft MFlash\n\n application that allows \nexecution of arbitrary code on the server. The issue occurs in the \nintegration configuration functionality that is only available to \nMFlash\n\n\n administrators. The vulnerability is related to insufficient validation\n of parameters when setting up security components.\n\nThis issue affects MFlash v. 8.0 and possibly others. To mitigate apply 8.2-653 hotfix 11.06.2025 and above."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8996",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-097",
          "name" : "https://www.drupal.org/sa-contrib-2025-097",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Drupal Layout Builder Advanced Permissions allows Forceful Browsing.This issue affects Layout Builder Advanced Permissions: from 0.0.0 before 2.2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8995",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-096",
          "name" : "https://www.drupal.org/sa-contrib-2025-096",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authentication Bypass Using an Alternate Path or Channel vulnerability in Drupal Authenticator Login allows Authentication Bypass.This issue affects Authenticator Login: from 0.0.0 before 2.1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8675",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-095",
          "name" : "https://www.drupal.org/sa-contrib-2025-095",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-Side Request Forgery (SSRF) vulnerability in Drupal AI SEO Link Advisor allows Server Side Request Forgery.This issue affects AI SEO Link Advisor: from 0.0.0 before 1.0.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8362",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-094",
          "name" : "https://www.drupal.org/sa-contrib-2025-094",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal GoogleTag Manager allows Cross-Site Scripting (XSS).This issue affects GoogleTag Manager: from 0.0.0 before 1.10.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8361",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-093",
          "name" : "https://www.drupal.org/sa-contrib-2025-093",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Drupal Config Pages allows Forceful Browsing.This issue affects Config Pages: from 0.0.0 before 2.18.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8092",
        "ASSIGNER" : "security@drupal.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.drupal.org/sa-contrib-2025-092",
          "name" : "https://www.drupal.org/sa-contrib-2025-092",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Drupal COOKiES Consent Management allows Cross-Site Scripting (XSS).This issue affects COOKiES Consent Management: from 0.0.0 before 1.2.16."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7961",
        "ASSIGNER" : "help@fluidattacks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://wulkano.com/",
          "name" : "http://wulkano.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://fluidattacks.com/advisories/cafrune",
          "name" : "https://fluidattacks.com/advisories/cafrune",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://getkap.co/",
          "name" : "https://getkap.co/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wulkano/Kap",
          "name" : "https://github.com/wulkano/Kap",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in Wulkano KAP on MacOS allows TCC Bypass.This issue affects KAP: 3.6.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8066",
        "ASSIGNER" : "help@fluidattacks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fluidattacks.com/advisories/cypress",
          "name" : "https://fluidattacks.com/advisories/cypress",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/bunkerity/bunkerweb",
          "name" : "https://github.com/bunkerity/bunkerweb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in Bunkerity Bunker Web on Linux allows Phishing.This issue affects Bunker Web: 1.6.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55207",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/withastro/astro/commit/5fc3c599cacb0172cc7d8e1202a5f2e8685d7ef2",
          "name" : "https://github.com/withastro/astro/commit/5fc3c599cacb0172cc7d8e1202a5f2e8685d7ef2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/withastro/astro/security/advisories/GHSA-9x9c-ghc5-jhw9",
          "name" : "https://github.com/withastro/astro/security/advisories/GHSA-9x9c-ghc5-jhw9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Astro is a web framework for content-driven websites. Following CVE-2025-54793 there's still an Open Redirect vulnerability in a subset of Astro deployment scenarios prior to version 9.4.1. Astro 5.12.8 addressed CVE-2025-54793 where https://example.com//astro.build/press would redirect to the external origin //astro.build/press. However, with the Node deployment adapter in standalone mode and trailingSlash set to \"always\" in the Astro configuration, https://example.com//astro.build/press still redirects to //astro.build/press. This affects any user who clicks on a specially crafted link pointing to the affected domain. Since the domain appears legitimate, victims may be tricked into trusting the redirected page, leading to possible credential theft, malware distribution, or other phishing-related attacks. This issue has been patched in version 9.4.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49898",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/dropshipping-xox/vulnerability/wordpress-dropshix-plugin-4-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/dropshipping-xox/vulnerability/wordpress-dropshix-plugin-4-0-14-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Xolluteon Dropshix allows DOM-Based XSS.This issue affects Dropshix: from n/a through 4.0.14."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49897",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/vertical-scroll-slideshow-gallery-v2/vulnerability/wordpress-vertical-scroll-slideshow-gallery-v2-plugin-9-1-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/vertical-scroll-slideshow-gallery-v2/vulnerability/wordpress-vertical-scroll-slideshow-gallery-v2-plugin-9-1-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in gopiplus Vertical scroll slideshow gallery v2 allows Blind SQL Injection. This issue affects Vertical scroll slideshow gallery v2: from n/a through 9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49432",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/fwduvp/vulnerability/wordpress-ultimate-video-player-plugin-plugin-10-1-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/fwduvp/vulnerability/wordpress-ultimate-video-player-plugin-plugin-10-1-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in FWDesign Ultimate Video Player allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Ultimate Video Player: from n/a through 10.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5048",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5047",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DGN file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5046",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0017",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DGN file, when linked or imported into Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55203",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1lQzQJ9Eun6xmcxyyAkr5ORyIrfw9ys5w/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1lQzQJ9Eun6xmcxyyAkr5ORyIrfw9ys5w/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/makeplane/plane/security/advisories/GHSA-rwjc-xhh3-m9m9",
          "name" : "https://github.com/makeplane/plane/security/advisories/GHSA-rwjc-xhh3-m9m9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Plane is open-source project management software. Prior to version 0.28.0, a stored cross-site scripting (XSS) vulnerability exists in the description_html field of Plane. This flaw allows an attacker to inject malicious JavaScript code that is stored and later executed in other users’ browsers. The description_html field is not properly sanitized or escaped. An attacker can submit crafted JavaScript payloads that are saved in the application’s database. When another user views the affected content, the injected code executes in their browser, running in the application’s context and bypassing standard security protections. Successful exploitation can lead to session hijacking, theft of sensitive information, or forced redirection to malicious sites. The vulnerability can also be chained with CSRF attacks to perform unauthorized actions, or leveraged to distribute malware and exploit additional browser vulnerabilities. This issue has been patched in version 0.28.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54989",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FirebirdSQL/firebird/commit/169da595f8693fc1a65a79c741724b1bc8db9f25",
          "name" : "https://github.com/FirebirdSQL/firebird/commit/169da595f8693fc1a65a79c741724b1bc8db9f25",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FirebirdSQL/firebird/issues/8554",
          "name" : "https://github.com/FirebirdSQL/firebird/issues/8554",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-7qp6-hqxj-pjjp",
          "name" : "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-7qp6-hqxj-pjjp",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Firebird is a relational database. Prior to versions 3.0.13, 4.0.6, and 5.0.3, there is an XDR message parsing NULL pointer dereference denial-of-service vulnerability in Firebird. This specific flaw exists within the parsing of xdr message from client. It leads to NULL pointer dereference and DoS. This issue has been patched in versions 3.0.13, 4.0.6, and 5.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54466",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.apache.org/jira/browse/OFBIZ-13276",
          "name" : "https://issues.apache.org/jira/browse/OFBIZ-13276",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.apache.org/thread/14d0yd9co9gx2mctd3vyz1cc8d39n915",
          "name" : "https://lists.apache.org/thread/14d0yd9co9gx2mctd3vyz1cc8d39n915",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ofbiz.apache.org/download.html",
          "name" : "https://ofbiz.apache.org/download.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ofbiz.apache.org/release-notes-24.09.02.html",
          "name" : "https://ofbiz.apache.org/release-notes-24.09.02.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ofbiz.apache.org/security.html",
          "name" : "https://ofbiz.apache.org/security.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability leading to a possible RCE in Apache OFBiz scrum plugin.\n\nThis issue affects Apache OFBiz: before 24.09.02 only when the scrum plugin is used.\n\nEven unauthenticated attackers can exploit this vulnerability.\n\n\nUsers are recommended to upgrade to version 24.09.02, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24975",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FirebirdSQL/firebird/commit/658abd20449f72097fbbce57e8e6ae42ff837fb6",
          "name" : "https://github.com/FirebirdSQL/firebird/commit/658abd20449f72097fbbce57e8e6ae42ff837fb6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FirebirdSQL/firebird/issues/8429",
          "name" : "https://github.com/FirebirdSQL/firebird/issues/8429",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-fx9r-rj68-7p69",
          "name" : "https://github.com/FirebirdSQL/firebird/security/advisories/GHSA-fx9r-rj68-7p69",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Firebird is a relational database. Prior to snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609, Firebird is vulnerable if ExtConnPoolSize is not set equal to 0. If connections stored in ExtConnPool are not verified for presence and suitability of the CryptCallback interface is used when created versus what is available could result in a segfault in the server process. Encrypted databases, accessed by execute statement on external, may be accessed later by an attachment missing a key to that database. In a case when execute statement are chained, segfault may happen. Additionally, the segfault may affect unencrypted databases. This issue has been patched in snapshot versions 4.0.6.3183, 5.0.2.1610, and 6.0.0.609 and point releases 4.0.6 and 5.0.2. A workaround for this issue involves setting ExtConnPoolSize equal to 0 in firebird.conf."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-12573",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-24752 Reason: This candidate is a reservation duplicate of CVE-2025-24752. Notes: All CVE users should reference CVE-2025-24752 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9053",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/9",
          "name" : "https://github.com/guoma-book/CVE/issues/9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320272",
          "name" : "VDB-320272 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320272",
          "name" : "VDB-320272 | projectworlds Travel Management System updatesubcategory.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632023",
          "name" : "Submit #632023 | Projectworlds Travel Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632024",
          "name" : "Submit #632024 | Projectworlds Travel Management System Project V1.0 SQL injection (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in projectworlds Travel Management System 1.0. This vulnerability affects unknown code of the file /updatesubcategory.php. The manipulation of the argument t1/s1 leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9052",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/8",
          "name" : "https://github.com/guoma-book/CVE/issues/8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320271",
          "name" : "VDB-320271 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320271",
          "name" : "VDB-320271 | projectworlds Travel Management System updatepackage.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.632022",
          "name" : "Submit #632022 | Projectworlds Travel Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/guoma-book/CVE/issues/8",
          "name" : "https://github.com/guoma-book/CVE/issues/8",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in projectworlds Travel Management System 1.0. This affects an unknown part of the file /updatepackage.php. The manipulation of the argument s1 leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9051",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/7",
          "name" : "https://github.com/guoma-book/CVE/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320270",
          "name" : "VDB-320270 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320270",
          "name" : "VDB-320270 | projectworlds Travel Management System updatecategory.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.632021",
          "name" : "Submit #632021 | Projectworlds Travel Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/guoma-book/CVE/issues/7",
          "name" : "https://github.com/guoma-book/CVE/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in projectworlds Travel Management System 1.0. Affected by this issue is some unknown functionality of the file /updatecategory.php. The manipulation of the argument t1 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-18T15:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9050",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/6",
          "name" : "https://github.com/guoma-book/CVE/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320269",
          "name" : "VDB-320269 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320269",
          "name" : "VDB-320269 | projectworlds Travel Management System addcategory.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.632004",
          "name" : "Submit #632004 | Projectworlds Travel Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in projectworlds Travel Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /addcategory.php. The manipulation of the argument t1 leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-18T15:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54475",
        "ASSIGNER" : "security@joomla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-54475",
          "name" : "https://github.com/AdamWallwork/CVEs/tree/main/2025/CVE-2025-54475",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://joomsky.com/js-jobs-joomla/",
          "name" : "https://joomsky.com/js-jobs-joomla/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A SQL injection vulnerability in the JS Jobs plugin versions 1.3.2-1.4.4 for Joomla allows low-privilege users to execute arbitrary SQL commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54474",
        "ASSIGNER" : "security@joomla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://dj-extensions.com/",
          "name" : "https://dj-extensions.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A SQLi vulnerability in DJ-Classifieds component 3.9.2-3.10.1 for Joomla was discovered. The issue allows privileged users to execute arbitrary SQL commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54473",
        "ASSIGNER" : "security@joomla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://phoca.cz/",
          "name" : "https://phoca.cz/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated RCE vulnerability in Phoca Commander component 1.0.0-4.0.0 and 5.0.0-5.0.1 for Joomla was discovered. The issue allows code execution via the unzip feature."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1929",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0198",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0198",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Risk Yazilim Teknolojileri Ltd. Sti. Reel Sektör Hazine ve Risk Yönetimi Yazilimi allows SQL Injection, CAPEC - 7 - Blind SQL Injection.This issue affects Reel Sektör Hazine ve Risk Yönetimi Yazilimi: through 1.0.0.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9047",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/2",
          "name" : "https://github.com/guoma-book/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320268",
          "name" : "VDB-320268 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320268",
          "name" : "VDB-320268 | projectworlds Visitor Management System visitor_out.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631994",
          "name" : "Submit #631994 | Projectworlds Visitor Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in projectworlds Visitor Management System 1.0. Affected is an unknown function of the file /visitor_out.php. The manipulation of the argument rid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:visitor_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T11:15Z",
    "lastModifiedDate" : "2025-08-18T15:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9046",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md#poc-python-exploit-script",
          "name" : "https://github.com/ZZ2266/.github.io/blob/main/AC20/formSetMacFilterCfg/readme.md#poc-python-exploit-script",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320267",
          "name" : "VDB-320267 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320267",
          "name" : "VDB-320267 | Tenda AC20 setMacFilterCfg sub_46A2AC stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631932",
          "name" : "Submit #631932 | Tenda AC20 V16.03.08.12 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda AC20 16.03.08.12. This issue affects the function sub_46A2AC of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac20_firmware:16.03.08.12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T11:15Z",
    "lastModifiedDate" : "2025-08-18T15:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9028",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Jackie1732/CVE/issues/3",
          "name" : "https://github.com/Jackie1732/CVE/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320093",
          "name" : "VDB-320093 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320093",
          "name" : "VDB-320093 | code-projects Online Medicine Guide adphar.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630188",
          "name" : "Submit #630188 | code-projects Online Medicine Guide v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Medicine Guide 1.0. This issue affects some unknown processing of the file /adphar.php. The manipulation of the argument phuname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T11:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26709",
        "ASSIGNER" : "psirt@zte.com.cn"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1288700446535356789",
          "name" : "https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/1288700446535356789",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There is an unauthorized access vulnerability in ZTE F50. Due to improper permission control of the Web module interface, an unauthorized attacker can obtain sensitive information through the interface"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T11:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9027",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Jackie1732/CVE/issues/2",
          "name" : "https://github.com/Jackie1732/CVE/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320092",
          "name" : "VDB-320092 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320092",
          "name" : "VDB-320092 | code-projects Online Medicine Guide addelivery.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.630187",
          "name" : "Submit #630187 | code-projects Online Medicine Guide v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Online Medicine Guide 1.0. This vulnerability affects unknown code of the file /addelivery.php. The manipulation of the argument deName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T10:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9026",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/i-Corner/cve/issues/17",
          "name" : "https://github.com/i-Corner/cve/issues/17",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320091",
          "name" : "VDB-320091 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320091",
          "name" : "VDB-320091 | D-Link DIR-860L Simple Service Discovery Protocol cgibin ssdpcgi_main os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.629946",
          "name" : "Submit #629946 | D-Link DIR-860L Rev.B 2.04.B04 Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in D-Link DIR-860L 2.04.B04. This affects the function ssdpcgi_main of the file htdocs/cgibin of the component Simple Service Discovery Protocol. The manipulation leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-860l_firmware:2.04.b04:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-860l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T10:15Z",
    "lastModifiedDate" : "2025-08-18T15:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9025",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Find33-3/cve/issues/2",
          "name" : "https://github.com/Find33-3/cve/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320090",
          "name" : "VDB-320090 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320090",
          "name" : "VDB-320090 | code-projects Simple Cafe Ordering System portal.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629790",
          "name" : "Submit #629790 | code-projects Simple Cafe Ordering System In PHP With Source Code V 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in code-projects Simple Cafe Ordering System 1.0. Affected by this issue is some unknown functionality of the file /portal.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9024",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StrongDog23/myCVE/issues/4",
          "name" : "https://github.com/StrongDog23/myCVE/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320089",
          "name" : "VDB-320089 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320089",
          "name" : "VDB-320089 | PHPGurukul Beauty Parlour Management System book-appointment.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629773",
          "name" : "Submit #629773 | PHPGurukul Beauty Parlour Management System V1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Beauty Parlour Management System 1.1. Affected by this vulnerability is an unknown functionality of the file /book-appointment.php. The manipulation of the argument Message leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9023",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zezhifu1/cve_report/blob/main/AC18/formsetschedled.md",
          "name" : "https://github.com/zezhifu1/cve_report/blob/main/AC18/formsetschedled.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/zezhifu1/cve_report/blob/main/AC7/formsetschedled.md",
          "name" : "https://github.com/zezhifu1/cve_report/blob/main/AC7/formsetschedled.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320088",
          "name" : "VDB-320088 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320088",
          "name" : "VDB-320088 | Tenda AC7/AC18 SetLEDCfg formSetSchedLed buffer overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629692",
          "name" : "Submit #629692 | Tenda AC7 V15.03.06.44 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629696",
          "name" : "Submit #629696 | Tenda AC18 V15.03.05.19(6318) Buffer Overflow (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Tenda AC7 and AC18 15.03.05.19/15.03.06.44. Affected is the function formSetSchedLed of the file /goform/SetLEDCfg. The manipulation of the argument Time leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8905",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/err-our-team/trunk/inc/inpersttion-for-shortcode.php#L8",
          "name" : "https://plugins.trac.wordpress.org/browser/err-our-team/trunk/inc/inpersttion-for-shortcode.php#L8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd4dc8ab-792b-41ff-a7b9-77a11c02d91b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd4dc8ab-792b-41ff-a7b9-77a11c02d91b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Inpersttion For Theme plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 1.0 via the theme_section_shortcode() function. This is due to the plugin not restricting what functions can be called. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server which is limited to arbitrary functions without any user supplied parameters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8720",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/wp-readme-parser/tags/1.3.15/includes/generate-output.php",
          "name" : "https://plugins.svn.wordpress.org/wp-readme-parser/tags/1.3.15/includes/generate-output.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-readme-parser/#developers",
          "name" : "https://wordpress.org/plugins/wp-readme-parser/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/aad6151a-6897-4d0c-9dfb-0f424c683111?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/aad6151a-6897-4d0c-9dfb-0f424c683111?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Plugin README Parser plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘target’ parameter in all versions up to, and including, 1.3.15 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8091",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/calendar/class-calendar_generator.php#L954",
          "name" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/calendar/class-calendar_generator.php#L954",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-event.php#L39",
          "name" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-event.php#L39",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-evo-shortcodes.php#L32",
          "name" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-evo-shortcodes.php#L32",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-evo-shortcodes.php#L81",
          "name" : "https://plugins.trac.wordpress.org/browser/eventon-lite/trunk/includes/class-evo-shortcodes.php#L81",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/eventon-lite/",
          "name" : "https://wordpress.org/plugins/eventon-lite/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/421fcee2-a05d-4486-837e-ddee3d73d737?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/421fcee2-a05d-4486-837e-ddee3d73d737?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The EventON Lite plugin for WordPress is vulnerable to Information Exposure in all versions less than, or equal to, 2.4.6 via the add_single_eventon and add_eventon shortcodes due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to extract data from password protected, private, or draft posts that they should not have access to."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8080",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L26",
          "name" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L26",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L41",
          "name" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L41",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L63",
          "name" : "https://plugins.trac.wordpress.org/browser/alobaidi-captcha/trunk/login-form.php#L63",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44f6048b-7de6-4ec9-af89-cd08c43d0aaa?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44f6048b-7de6-4ec9-af89-cd08c43d0aaa?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Alobaidi Captcha plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin settings in all versions up to, and including, 1.0.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7778",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/icons-factory/tags/1.6.12/icons-factory.php#L1330",
          "name" : "https://plugins.trac.wordpress.org/browser/icons-factory/tags/1.6.12/icons-factory.php#L1330",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/icons-factory/#developers",
          "name" : "https://wordpress.org/plugins/icons-factory/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/24f31bbf-883f-4903-847a-7bfc3e45654c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/24f31bbf-883f-4903-847a-7bfc3e45654c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Icons Factory plugin for WordPress is vulnerable to Arbitrary File Deletion due to insufficient authorization and improper path validation within the delete_files() function in all versions up to, and including, 1.6.12. This makes it possible for unauthenticated attackers to to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7688",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/add-user-meta/trunk/plugin.php",
          "name" : "https://plugins.trac.wordpress.org/browser/add-user-meta/trunk/plugin.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/add-user-meta/",
          "name" : "https://wordpress.org/plugins/add-user-meta/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1535a174-ab59-4c6e-8080-ef818e00b070?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1535a174-ab59-4c6e-8080-ef818e00b070?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Add User Meta plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0.1. This is due to missing or incorrect nonce validation on the 'add-user-meta' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7662",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/gestion-tarifs/trunk/gestion-tarifs-shortcodes.php",
          "name" : "https://plugins.trac.wordpress.org/browser/gestion-tarifs/trunk/gestion-tarifs-shortcodes.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/gestion-tarifs/",
          "name" : "https://wordpress.org/plugins/gestion-tarifs/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d117d930-d210-44bf-ac49-19c003ca5a24?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d117d930-d210-44bf-ac49-19c003ca5a24?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Gestion de tarifs plugin for WordPress is vulnerable to SQL Injection via the 'tarif' and 'intitule' shortcodes in all versions up to, and including, 1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7650",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/bizcalendar-web/",
          "name" : "https://wordpress.org/plugins/bizcalendar-web/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0640538c-b076-453c-a32e-f33b4e1c77ae?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0640538c-b076-453c-a32e-f33b4e1c77ae?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BizCalendar Web plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.1.0.50 via the 'bizcalv' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7641",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://plugins.trac.wordpress.org/browser/assistant-for-nextgen-gallery/trunk/nextgenassistant.php#L163",
          "name" : "http://plugins.trac.wordpress.org/browser/assistant-for-nextgen-gallery/trunk/nextgenassistant.php#L163",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/assistant-for-nextgen-gallery/",
          "name" : "https://wordpress.org/plugins/assistant-for-nextgen-gallery/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/07ebb176-a1f8-4a5c-8d81-a83fda4b0af3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/07ebb176-a1f8-4a5c-8d81-a83fda4b0af3?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Assistant for NextGEN Gallery plugin for WordPress is vulnerable to arbitrary directory deletion due to insufficient file path validation in the /wp-json/nextgenassistant/v1.0.0/control REST endpoint in all versions up to, and including, 1.0.9. This makes it possible for unauthenticated attackers to delete arbitrary directories on the server, which can cause a complete loss of availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7507",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/elink-embed-content/",
          "name" : "https://wordpress.org/plugins/elink-embed-content/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bda249f7-07a9-47ba-bba4-85abd8f8a207?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bda249f7-07a9-47ba-bba4-85abd8f8a207?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The elink – Embed Content plugin for WordPress is vulnerable to Malicious Redirect in all versions up to, and including, 1.1.0. This is due to the plugin not restricting URLS that can be supplied through the elink shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to supply an HTML file that can be leverged to redirect users to a malicious domain."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5844",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/radius-blocks/tags/2.2.1/templates/blocks/advanced-heading/layout.php#L29",
          "name" : "https://plugins.trac.wordpress.org/browser/radius-blocks/tags/2.2.1/templates/blocks/advanced-heading/layout.php#L29",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/radius-blocks/#developers",
          "name" : "https://wordpress.org/plugins/radius-blocks/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff41796a-0ba8-468f-8b79-274064da154e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ff41796a-0ba8-468f-8b79-274064da154e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Radius Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘subHeadingTagName’ parameter in all versions up to, and including, 2.2.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T09:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9022",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320087",
          "name" : "VDB-320087 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320087",
          "name" : "VDB-320087 | SourceCodester Online Bank Management System statements.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631862",
          "name" : "Submit #631862 | https://www.sourcecodester.com/php/15373 online-banking-management-system 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in SourceCodester Online Bank Management System up to 1.0. This issue affects some unknown processing of the file /bank/statements.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T08:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9021",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320086",
          "name" : "VDB-320086 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320086",
          "name" : "VDB-320086 | SourceCodester Online Bank Management System transfer.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631861",
          "name" : "Submit #631861 | https://www.sourcecodester.com/php/15373 online-banking-management-system 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in SourceCodester Online Bank Management System up to 1.0. This vulnerability affects unknown code of the file /bank/transfer.php. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T08:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9020",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PX4/PX4-Autopilot/issues/25046",
          "name" : "https://github.com/PX4/PX4-Autopilot/issues/25046",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/PX4/PX4-Autopilot/pull/25082",
          "name" : "https://github.com/PX4/PX4-Autopilot/pull/25082",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/PX4/PX4-Autopilot/pull/25082/commits/4395d4f00c49b888f030f5b43e2a779f1fa78708",
          "name" : "https://github.com/PX4/PX4-Autopilot/pull/25082/commits/4395d4f00c49b888f030f5b43e2a779f1fa78708",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320081",
          "name" : "VDB-320081 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320081",
          "name" : "VDB-320081 | PX4 PX4-Autopilot Mavlink Shell Closing mavlink_receiver.cpp handle_message_serial_control use after free",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624722",
          "name" : "Submit #624722 | PX4 PX4-Autopilot main and v1.15.4 Race Condition in File Access",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PX4 PX4-Autopilot up to 1.15.4. This issue affects the function MavlinkReceiver::handle_message_serial_control of the file src/modules/mavlink/mavlink_receiver.cpp of the component Mavlink Shell Closing Handler. The manipulation of the argument _mavlink_shell leads to use after free. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The identifier of the patch is 4395d4f00c49b888f030f5b43e2a779f1fa78708. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T08:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8604",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-table-builder/trunk/inc/admin/class-tables.php#L153",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-table-builder/trunk/inc/admin/class-tables.php#L153",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3341699%40wp-table-builder%2Ftrunk&old=3336979%40wp-table-builder%2Ftrunk&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3341699%40wp-table-builder%2Ftrunk&old=3336979%40wp-table-builder%2Ftrunk&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-table-builder",
          "name" : "https://wordpress.org/plugins/wp-table-builder",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac2f6549-016f-494d-99a4-52a1527f1fd2?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac2f6549-016f-494d-99a4-52a1527f1fd2?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Table Builder – WordPress Table Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wptb shortcode in all versions up to, and including, 2.0.12 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T08:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9019",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/appneta/tcpreplay/issues/959",
          "name" : "https://github.com/appneta/tcpreplay/issues/959",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320080",
          "name" : "VDB-320080 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320080",
          "name" : "VDB-320080 | tcpreplay tcpprep cidr.c mask_cidr6 heap-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623635",
          "name" : "Submit #623635 | tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623636",
          "name" : "Submit #623636 | tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623637",
          "name" : "Submit #623637 | tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623638",
          "name" : "Submit #623638 | tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/13SQYVIb_YQoRfaJaaLf6iLtMiCRCHlBc/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/13SQYVIb_YQoRfaJaaLf6iLtMiCRCHlBc/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/958",
          "name" : "https://github.com/appneta/tcpreplay/issues/958",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/958#issuecomment-3124876035",
          "name" : "https://github.com/appneta/tcpreplay/issues/958#issuecomment-3124876035",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623639",
          "name" : "Submit #623639 | tcpreplay tcpprep tcpreplay version 6fcbf03 (the newest master in https://github.com/appneta/tcpreplay) Heap Buffer Overflow (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/959",
          "name" : "https://github.com/appneta/tcpreplay/issues/959",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/appneta/tcpreplay/issues/958",
          "name" : "https://github.com/appneta/tcpreplay/issues/958",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623639",
          "name" : "https://vuldb.com/?submit.623639",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in tcpreplay 4.5.1. This vulnerability affects the function mask_cidr6 of the file cidr.c of the component tcpprep. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The researcher is able to reproduce this with the latest official release 4.5.1 and the current master branch. The code maintainer cannot reproduce this for 4.5.2-beta1. In his reply the maintainer explains that \"[i]n that case, this is a duplicate that was fixed in 4.5.2.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9017",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiguala123/myCVE/issues/7",
          "name" : "https://github.com/xiguala123/myCVE/issues/7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320068",
          "name" : "VDB-320068 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320068",
          "name" : "VDB-320068 | PHPGurukul Zoo Management System add-foreigner-ticket.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629562",
          "name" : "Submit #629562 | PHPGurukul Zoo Management System V2.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/xiguala123/myCVE/issues/7",
          "name" : "https://github.com/xiguala123/myCVE/issues/7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Zoo Management System 2.1. This vulnerability affects unknown code of the file /admin/add-foreigner-ticket.php. The manipulation of the argument visitorname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9016",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX",
          "name" : "https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320067",
          "name" : "VDB-320067 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320067",
          "name" : "VDB-320067 | Mechrevo Control Center GX V2 Powershell Script Command uncontrolled search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624900",
          "name" : "Submit #624900 | Mechrevo Control Center GX V2 5.56.51.48 Elevation Of Privilege",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624900",
          "name" : "https://vuldb.com/?submit.624900",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Mechrevo Control Center GX V2 5.56.51.48. This affects an unknown part of the file C:\\Program Files\\OEM\\????????\\AiStoneService\\MyControlCenter\\Command of the component Powershell Script Handler. The manipulation leads to uncontrolled search path. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8451",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/assets/front-end/js/view/filterable-gallery.js",
          "name" : "https://plugins.trac.wordpress.org/browser/essential-addons-for-elementor-lite/trunk/assets/front-end/js/view/filterable-gallery.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3344071/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3344071/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4917652a-1c83-4570-98c5-1a34e637814e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4917652a-1c83-4570-98c5-1a34e637814e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Essential Addons for Elementor – Popular Elementor Templates & Widgets plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘data-gallery-items’ parameter in all versions up to, and including, 6.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8013",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/quttera-web-malware-scanner/trunk/qtrAjaxHandler.php#L352",
          "name" : "https://plugins.trac.wordpress.org/browser/quttera-web-malware-scanner/trunk/qtrAjaxHandler.php#L352",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/quttera-web-malware-scanner/trunk/qtrExternalScanner.php#L28",
          "name" : "https://plugins.trac.wordpress.org/browser/quttera-web-malware-scanner/trunk/qtrExternalScanner.php#L28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3344330/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3344330/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/40957153-45f1-40c9-91ce-f3491ca7eee5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/40957153-45f1-40c9-91ce-f3491ca7eee5?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Quttera Web Malware Scanner plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 3.5.1.41 via the 'RunExternalScan' function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.8,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6679",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3343461%40bit-form%2Ftrunk&old=3336733%40bit-form%2Ftrunk&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3343461%40bit-form%2Ftrunk&old=3336733%40bit-form%2Ftrunk&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/bit-form/",
          "name" : "https://wordpress.org/plugins/bit-form/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e2e294f-904b-4674-8baf-d3a9a260d634?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e2e294f-904b-4674-8baf-d3a9a260d634?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Bit Form builder plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 2.20.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible. For this to be exploitable, the PRO version needs to be installed and activated as well. Additionally a form with an advanced file upload element needs to be published."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T07:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9013",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StrongDog23/myCVE/issues/3",
          "name" : "https://github.com/StrongDog23/myCVE/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320044",
          "name" : "VDB-320044 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320044",
          "name" : "VDB-320044 | PHPGurukul Online Shopping Portal Project password-recovery.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629553",
          "name" : "Submit #629553 | PHPGurukul Online Shopping Portal Project V2.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Online Shopping Portal Project 2.0. This vulnerability affects unknown code of the file /shopping/password-recovery.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T06:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9012",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StrongDog23/myCVE/issues/2",
          "name" : "https://github.com/StrongDog23/myCVE/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320043",
          "name" : "VDB-320043 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320043",
          "name" : "VDB-320043 | PHPGurukul Online Shopping Portal Project bill-ship-addresses.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629456",
          "name" : "Submit #629456 | PHPGurukul Online Shopping Portal Project V2.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in PHPGurukul Online Shopping Portal Project 2.0. This affects an unknown part of the file shopping/bill-ship-addresses.php. The manipulation of the argument billingpincode leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T06:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9011",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StrongDog23/myCVE/issues/1",
          "name" : "https://github.com/StrongDog23/myCVE/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320042",
          "name" : "VDB-320042 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320042",
          "name" : "VDB-320042 | PHPGurukul Online Shopping Portal Project signup.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629438",
          "name" : "Submit #629438 | PHPGurukul Online Shopping Portal Project V2.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in PHPGurukul Online Shopping Portal Project 2.0. Affected by this issue is some unknown functionality of the file /shopping/signup.php. The manipulation of the argument emailid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T05:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9010",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/2",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320041",
          "name" : "VDB-320041 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.320041",
          "name" : "VDB-320041 | itsourcecode Online Tour and Travel Management System booking_report.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628874",
          "name" : "Submit #628874 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/2",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/booking_report.php. The manipulation of the argument from_date leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T05:15Z",
    "lastModifiedDate" : "2025-08-18T15:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9009",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/3",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/3",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320040",
          "name" : "VDB-320040 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.320040",
          "name" : "VDB-320040 | itsourcecode Online Tour and Travel Management System email_setup.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628873",
          "name" : "Submit #628873 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Affected is an unknown function of the file /admin/email_setup.php. The manipulation of the argument Name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T05:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31961",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123268",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123268",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Connections contains a broken access control vulnerability that may allow unauthorized user to update data in certain scenarios."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T05:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9008",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/4",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320039",
          "name" : "VDB-320039 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.320039",
          "name" : "VDB-320039 | itsourcecode Online Tour and Travel Management System sms_setting.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628871",
          "name" : "Submit #628871 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/sms_setting.php. The manipulation of the argument uname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T04:15Z",
    "lastModifiedDate" : "2025-08-18T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9007",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/moweizhang1994/cve/issues/3",
          "name" : "https://github.com/moweizhang1994/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/moweizhang1994/cve/issues/3",
          "name" : "https://github.com/moweizhang1994/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320036",
          "name" : "VDB-320036 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320036",
          "name" : "VDB-320036 | Tenda CH22 editFileName formeditFileName buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628867",
          "name" : "Submit #628867 | Tenda CH22 V1.0.0.1 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Tenda CH22 1.0.0.1. Affected by this issue is the function formeditFileName of the file /goform/editFileName. The manipulation leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T04:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9006",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/moweizhang1994/cve/issues/2",
          "name" : "https://github.com/moweizhang1994/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/moweizhang1994/cve/issues/2",
          "name" : "https://github.com/moweizhang1994/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320035",
          "name" : "VDB-320035 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.320035",
          "name" : "VDB-320035 | Tenda CH22 delFileName formdelFileName buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628845",
          "name" : "Submit #628845 | Tenda CH22 V1.0.0.1 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda CH22 1.0.0.1. Affected by this vulnerability is the function formdelFileName of the file /goform/delFileName. The manipulation leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ch22_firmware:1.0.0.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ch22:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9005",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMJO",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMJO",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMJO",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMJO",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320034",
          "name" : "VDB-320034 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320034",
          "name" : "VDB-320034 | mtons mblog register information exposure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628787",
          "name" : "Submit #628787 | mtons https://gitee.com/mtons/mblog  <=3.5.0 Usename Enumeration & Batch Account Registration",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in mtons mblog up to 3.5.0. Affected is an unknown function of the file /register. The manipulation leads to information exposure through error message. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9004",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMIR",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMIR",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMIR",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMIR",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320033",
          "name" : "VDB-320033 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320033",
          "name" : "VDB-320033 | mtons mblog password excessive authentication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628785",
          "name" : "Submit #628785 | mtons https://gitee.com/mtons/mblog  <=3.5.0 Password Enumeration",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in mtons mblog up to 3.5.0. This issue affects some unknown processing of the file /settings/password. The manipulation leads to improper restriction of excessive authentication attempts. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9003",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.320032",
          "name" : "VDB-320032 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320032",
          "name" : "VDB-320032 | D-Link DIR-818LW DHCP Reserved Address bsc_lan.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628334",
          "name" : "Submit #628334 | D-link DIR-818LW Firmware version: 1.04 Firmware version: 1.04 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in D-Link DIR-818LW 1.04. This vulnerability affects unknown code of the file /bsc_lan.php of the component DHCP Reserved Address Handler. The manipulation of the argument Name leads to cross site scripting. The attack can be initiated remotely. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9002",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/fatdog957/CVE-/issues/1",
          "name" : "https://github.com/fatdog957/CVE-/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320031",
          "name" : "VDB-320031 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320031",
          "name" : "VDB-320031 | Surbowl dormitory-management-php login.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625595",
          "name" : "Submit #625595 | github.com dormitory management php V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/fatdog957/CVE-/issues/1",
          "name" : "https://github.com/fatdog957/CVE-/issues/1",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Surbowl dormitory-management-php 1.0. This affects an unknown part of the file login.php. The manipulation of the argument Account leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9001",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hkohi.ca/vulnerability/16",
          "name" : "https://hkohi.ca/vulnerability/16",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320030",
          "name" : "VDB-320030 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320030",
          "name" : "VDB-320030 | LemonOS HTTP Client main.cpp HTTPGet stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/LemonOSProject/LemonOS/issues/60",
          "name" : "https://github.com/LemonOSProject/LemonOS/issues/60",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624974",
          "name" : "Submit #624974 | LemonOS Lemon OS nightly-2024-07-12 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/LemonOSProject/LemonOS/issues/60",
          "name" : "https://github.com/LemonOSProject/LemonOS/issues/60",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://hkohi.ca/vulnerability/16",
          "name" : "https://hkohi.ca/vulnerability/16",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624974",
          "name" : "https://vuldb.com/?submit.624974",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in LemonOS up to nightly-2024-07-12 on LemonOS. Affected by this issue is the function HTTPGet of the file /Applications/Steal/main.cpp of the component HTTP Client. The manipulation of the argument chunkSize leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8867",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/AreaChart.php#L156",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/AreaChart.php#L156",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/ColumnChart.php#L183",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/ColumnChart.php#L183",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/DistributeColumnChart.php#L179",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/DistributeColumnChart.php#L179",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/HeatmapChart.php#L173",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/HeatmapChart.php#L173",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/LineChart.php#L186",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/LineChart.php#L186",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/RadarChart.php#L182",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/RadarChart.php#L182",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/ScatterChart.php#L181",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/ScatterChart.php#L181",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/TimelineChart.php#L173",
          "name" : "https://plugins.trac.wordpress.org/browser/graphina-elementor-charts-and-graphs/trunk/includes/Charts/Elementor/Elements/ApexCharts/TimelineChart.php#L173",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343408%40graphina-elementor-charts-and-graphs&new=3343408%40graphina-elementor-charts-and-graphs&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343408%40graphina-elementor-charts-and-graphs&new=3343408%40graphina-elementor-charts-and-graphs&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7f76ef-3f97-4889-8902-f13a4a298475?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae7f76ef-3f97-4889-8902-f13a4a298475?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Graphina - Elementor Charts and Graphs plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple chart widget parameters in version 3.1.3 and below. This is due to insufficient input sanitization and output escaping on user supplied attributes such as chart categories, titles, and tooltip settings. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8680",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.30/bplugins_sdk/inc/Base/FSActivate.php#L166",
          "name" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.30/bplugins_sdk/inc/Base/FSActivate.php#L166",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343487%40b-slider&new=3343487%40b-slider&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343487%40b-slider&new=3343487%40b-slider&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac245316-228e-4508-b3fe-f7071fb1bc8e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac245316-228e-4508-b3fe-f7071fb1bc8e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Server-Side Request Forgery in version less than, or equal to, 2.0.0 via the fs_api_request function. This makes it possible for authenticated attackers, with subscriber-level access and above to make web requests to arbitrary locations originating from the web application which can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8676",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.30/adminMenu.php#L83",
          "name" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.30/adminMenu.php#L83",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343487%40b-slider&new=3343487%40b-slider&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3343487%40b-slider&new=3343487%40b-slider&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c19b24ef-cf49-4a5c-a187-0f09ac53c337?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c19b24ef-cf49-4a5c-a187-0f09ac53c337?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Sensitive Information Exposure in versions less than, or equal to, 2.0.0 via the get_active_plugins function. This makes it possible for authenticated attackers, with subscriber-level access and above to extract sensitive data including installed plugin information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8342",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.8.47/login-with-phonenumber.php#L4358",
          "name" : "https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.8.47/login-with-phonenumber.php#L4358",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.8.47/login-with-phonenumber.php#L4373",
          "name" : "https://plugins.trac.wordpress.org/browser/login-with-phone-number/tags/1.8.47/login-with-phonenumber.php#L4373",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3338150%40login-with-phone-number&new=3338150%40login-with-phone-number&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3338150%40login-with-phone-number&new=3338150%40login-with-phone-number&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e74582f-8e94-4cba-a3eb-0a823a5235ad?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e74582f-8e94-4cba-a3eb-0a823a5235ad?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WooCommerce OTP Login With Phone Number, OTP Verification plugin for WordPress is vulnerable to authentication bypass due to insufficient empty value checking in the lwp_ajax_register function in all versions up to, and including, 1.8.47. This makes it possible for unauthenticated attackers to bypass OTP verification and gain administrative access to any user account with a configured phone number by exploiting improper Firebase API error handling when the Firebase API key is not configured."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6025",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-602"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/order-tip-woo/trunk/assets/build/front.bundle.js",
          "name" : "https://plugins.trac.wordpress.org/browser/order-tip-woo/trunk/assets/build/front.bundle.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/order-tip-woo/trunk/frontend/views/tip-form.php#L49",
          "name" : "https://plugins.trac.wordpress.org/browser/order-tip-woo/trunk/frontend/views/tip-form.php#L49",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3318615%40order-tip-woo&new=3318615%40order-tip-woo&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3318615%40order-tip-woo&new=3318615%40order-tip-woo&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bcd18bd-032e-4a97-83aa-a377f9b1f435?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9bcd18bd-032e-4a97-83aa-a377f9b1f435?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Order Tip for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Improper Input Validation in all versions up to, and including, 1.5.4. This is due to lack of server-side validation on the `data-tip` attribute, which makes it possible for unauthenticated attackers to apply an excessive or even negative tip amount, resulting in unauthorized discount up to free orders depending on the value submitted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55726",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55725",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55724",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55723",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55722",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55721",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55720",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55719",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55718",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not used"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T03:15Z",
    "lastModifiedDate" : "2025-08-15T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9000",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX",
          "name" : "https://drive.proton.me/urls/7QYSEW6734#H3N4fQ3mw6gX",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.320029",
          "name" : "VDB-320029 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.320029",
          "name" : "VDB-320029 | Mechrevo Control Center GX V2 reg File uncontrolled search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624903",
          "name" : "Submit #624903 | Mechrevo Control Center GX V2 5.56.51.48 Insecure .reg File Handler",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624903",
          "name" : "https://vuldb.com/?submit.624903",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Mechrevo Control Center GX V2 5.56.51.48. Affected by this vulnerability is an unknown functionality of the component reg File Handler. The manipulation leads to uncontrolled search path. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T02:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8993",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/1",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319989",
          "name" : "VDB-319989 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319989",
          "name" : "VDB-319989 | itsourcecode Online Tour and Travel Management System expense_report.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628788",
          "name" : "Submit #628788 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/issues/1",
          "name" : "https://github.com/lin-3-start/lin-cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This affects an unknown part of the file /admin/expense_report.php. The manipulation of the argument from_date leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T02:15Z",
    "lastModifiedDate" : "2025-08-18T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8992",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMGP",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMGP",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319988",
          "name" : "VDB-319988 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319988",
          "name" : "VDB-319988 | mtons mblog cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628765",
          "name" : "Submit #628765 | mtons https://gitee.com/mtons/mblog  <=3.5.0 CSRF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMGP",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMGP",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in mtons mblog up to 3.5.0. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-15T02:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8991",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-840"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/linlinjava/litemall/issues/566",
          "name" : "https://github.com/linlinjava/litemall/issues/566",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/566#issue-3267858791",
          "name" : "https://github.com/linlinjava/litemall/issues/566#issue-3267858791",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319987",
          "name" : "VDB-319987 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319987",
          "name" : "VDB-319987 | linlinjava litemall Business Logic express logic error",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628764",
          "name" : "Submit #628764 | linlinjava https://github.com/linlinjava/litemall  <=1.8.0 Business Logic Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in linlinjava litemall up to 1.8.0. Affected by this vulnerability is an unknown functionality of the file /admin/config/express of the component Business Logic Handler. The manipulation of the argument litemall_express_freight_min leads to business logic errors. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-15T01:16Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8990",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/zhuyi-hz/cve/issues/1",
          "name" : "https://github.com/zhuyi-hz/cve/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319986",
          "name" : "VDB-319986 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319986",
          "name" : "VDB-319986 | code-projects Online Medicine Guide browsemdcn.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628677",
          "name" : "Submit #628677 | code-projects Online Medicine Guide V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /browsemdcn.php. The manipulation of the argument Search leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-15T01:16Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8989",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/2",
          "name" : "https://github.com/zhuyi-hz/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319985",
          "name" : "VDB-319985 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319985",
          "name" : "VDB-319985 | SourceCodester COVID 19 Testing Management System edit-phlebotomist.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628676",
          "name" : "Submit #628676 | sourcecodester COVID 19 Testing Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. This issue affects some unknown processing of the file /edit-phlebotomist.php. The manipulation of the argument mobilenumber leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T01:16Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8988",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/3",
          "name" : "https://github.com/zhuyi-hz/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319984",
          "name" : "VDB-319984 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319984",
          "name" : "VDB-319984 | SourceCodester COVID 19 Testing Management System bwdates-report-result.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628675",
          "name" : "Submit #628675 | sourcecodester COVID 19 Testing Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SourceCodester COVID 19 Testing Management System 1.0. This vulnerability affects unknown code of the file /bwdates-report-result.php. The manipulation of the argument fromdate leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T23:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8987",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/4",
          "name" : "https://github.com/zhuyi-hz/cve/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319983",
          "name" : "VDB-319983 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319983",
          "name" : "VDB-319983 | SourceCodester COVID 19 Testing Management System test-details.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628664",
          "name" : "Submit #628664 | SourceCodester COVID 19 Testing Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in SourceCodester COVID 19 Testing Management System 1.0. This affects an unknown part of the file /test-details.php. The manipulation of the argument remark leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T23:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31987",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123272",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0123272",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Connections Docs may mishandle validation of certain uploaded documents leading to denial of service due to resource exhaustion."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T23:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8986",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/5",
          "name" : "https://github.com/zhuyi-hz/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319982",
          "name" : "VDB-319982 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319982",
          "name" : "VDB-319982 | SourceCodester COVID 19 Testing Management System search-report-result.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628663",
          "name" : "Submit #628663 | sourcecodester  COVID 19 Testing Management System V1.0  SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/zhuyi-hz/cve/issues/5",
          "name" : "https://github.com/zhuyi-hz/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /search-report-result.php. The manipulation of the argument serachdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T22:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8985",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/6",
          "name" : "https://github.com/zhuyi-hz/cve/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319981",
          "name" : "VDB-319981 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319981",
          "name" : "VDB-319981 | SourceCodester COVID 19 Testing Management System profile.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628662",
          "name" : "Submit #628662 | sourcecodester COVID 19 Testing Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/zhuyi-hz/cve/issues/6",
          "name" : "https://github.com/zhuyi-hz/cve/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T22:15Z",
    "lastModifiedDate" : "2025-08-18T15:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8984",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/7",
          "name" : "https://github.com/zhuyi-hz/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319980",
          "name" : "VDB-319980 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319980",
          "name" : "VDB-319980 | itsourcecode Online Tour and Travel Management System expense_category.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628661",
          "name" : "Submit #628661 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/zhuyi-hz/cve/issues/7",
          "name" : "https://github.com/zhuyi-hz/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Affected is an unknown function of the file /admin/operations/expense_category.php. The manipulation of the argument expense_name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T22:15Z",
    "lastModifiedDate" : "2025-08-18T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8983",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/8",
          "name" : "https://github.com/zhuyi-hz/cve/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319979",
          "name" : "VDB-319979 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319979",
          "name" : "VDB-319979 | itsourcecode Online Tour and Travel Management System expense.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628660",
          "name" : "Submit #628660 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/zhuyi-hz/cve/issues/8",
          "name" : "https://github.com/zhuyi-hz/cve/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/operations/expense.php. The manipulation of the argument expense_for leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T21:15Z",
    "lastModifiedDate" : "2025-08-18T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8982",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/9",
          "name" : "https://github.com/zhuyi-hz/cve/issues/9",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319978",
          "name" : "VDB-319978 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319978",
          "name" : "VDB-319978 | itsourcecode Online Tour and Travel Management System currency.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628659",
          "name" : "Submit #628659 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/currency.php. The manipulation of the argument curr_code leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T21:15Z",
    "lastModifiedDate" : "2025-08-18T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8981",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zhuyi-hz/cve/issues/10",
          "name" : "https://github.com/zhuyi-hz/cve/issues/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319977",
          "name" : "VDB-319977 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319977",
          "name" : "VDB-319977 | itsourcecode Online Tour and Travel Management System payment.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628658",
          "name" : "Submit #628658 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This affects an unknown part of the file /admin/operations/payment.php. The manipulation of the argument payment_type leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8980",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-345"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/G1_Auth.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/G1_Auth.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/G1_Inte.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/G1_Inte.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319976",
          "name" : "VDB-319976 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319976",
          "name" : "VDB-319976 | Tenda G1 Firmware Update check_upload_file data authenticity",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628605",
          "name" : "Submit #628605 | Tenda G1 V16.01.7.8(3660) CWE-327 Use of a Broken or Risky Cryptographic Algorithm",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628606",
          "name" : "Submit #628606 | Tenda G1 V16.01.7.8(3660) CWE-287 Improper Authentication (Duplicate)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Tenda G1 16.01.7.8(3660). Affected by this issue is the function check_upload_file of the component Firmware Update Handler. The manipulation leads to insufficient verification of data authenticity. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:g1_firmware:16.01.7.8\\(3660\\):*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:g1:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8979",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-345"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Auth.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Auth.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Inte.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Tenda/AC15_Inte.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319975",
          "name" : "VDB-319975 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319975",
          "name" : "VDB-319975 | Tenda AC15 Firmware Update check_fw data authenticity",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628602",
          "name" : "Submit #628602 | Tenda  AC15 V15.13.07.13 CWE-287 Improper Authentication",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628603",
          "name" : "Submit #628603 | Tenda AC15 V15.13.07.13 CWE-20 Improper Input Validation (Duplicate)",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda AC15 15.13.07.13. Affected by this vulnerability is the function check_fw_type/split_fireware/check_fw of the component Firmware Update Handler. The manipulation leads to insufficient verification of data authenticity. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac15_firmware:15.13.07.13:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51965",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://ourphp.com",
          "name" : "http://ourphp.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.ourphp.net/",
          "name" : "https://www.ourphp.net/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.yuque.com/hkone-3iknd/sgwwfb/nvi4f00wqh3kyg0z?singleDoc",
          "name" : "https://www.yuque.com/hkone-3iknd/sgwwfb/nvi4f00wqh3kyg0z?singleDoc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OURPHP thru 8.6.1 is vulnerable to Cross-Site Scripting (XSS) via the \"Name\" field of the \"Complete Profile\" functionality under the \"My User Center\" page, which can be accessed after registering through the front-end interface."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50862",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://comlotuscarsdomesticintl.com",
          "name" : "http://comlotuscarsdomesticintl.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://lotus.com",
          "name" : "http://lotus.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JackSessions/Jack-Sessions-CVEs/tree/main",
          "name" : "https://github.com/JackSessions/Jack-Sessions-CVEs/tree/main",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 has allowBackup=true set in its manifest, allowing data exfiltration via ADB backup on rooted or debug-enabled devices. This presents a risk of user data exposure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50861",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://comlotuscarsdomesticintl.com",
          "name" : "http://comlotuscarsdomesticintl.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://lotus.com",
          "name" : "http://lotus.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JackSessions/Jack-Sessions-CVEs/tree/main",
          "name" : "https://github.com/JackSessions/Jack-Sessions-CVEs/tree/main",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Lotus Cars Android app (com.lotus.carsdomestic.intl) 1.2.8 contains an exported component, PushDeepLinkActivity, which is accessible without authentication via ADB or malicious apps. This poses a risk of unintended access to application internals and can cause denial of service or logic abuse."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T20:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8978",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DIR619L.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DIR619L.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319974",
          "name" : "VDB-319974 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319974",
          "name" : "VDB-319974 | D-Link DIR-619L boa FirmwareUpgrade data authenticity",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628599",
          "name" : "Submit #628599 | D-Link DIR619L 6.02CN02 CWE-287 Improper Authentication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DIR619L.md",
          "name" : "https://github.com/IOTRes/IOT_Firmware_Update/blob/main/Dlink/DIR619L.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in D-Link DIR-619L 6.02CN02. Affected is the function FirmwareUpgrade of the component boa. The manipulation leads to insufficient verification of data authenticity. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8976",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/givanz/Vvveb/releases/tag/1.0.6",
          "name" : "https://github.com/givanz/Vvveb/releases/tag/1.0.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://hkohi.ca/vulnerability/7",
          "name" : "https://hkohi.ca/vulnerability/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319972",
          "name" : "VDB-319972 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319972",
          "name" : "VDB-319972 | givanz Vvveb Endpoint post cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628297",
          "name" : "Submit #628297 | Vvveb 1.0.5 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628297",
          "name" : "https://vuldb.com/?submit.628297",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in givanz Vvveb up to 1.0.5. This vulnerability affects unknown code of the file /vadmin123/index.php?module=content/post&type=post of the component Endpoint. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vvveb:vvveb:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-18T15:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8975",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/0xHamy/b2674eeffd1f73af96d29f152c47bcbd",
          "name" : "https://gist.github.com/0xHamy/b2674eeffd1f73af96d29f152c47bcbd",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/commit/84c11d69df8452dc378feecd17e2a62ac10dac66",
          "name" : "https://github.com/givanz/Vvveb/commit/84c11d69df8452dc378feecd17e2a62ac10dac66",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/releases/tag/1.0.6",
          "name" : "https://github.com/givanz/Vvveb/releases/tag/1.0.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://hkohi.ca/vulnerability/6",
          "name" : "https://hkohi.ca/vulnerability/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319971",
          "name" : "VDB-319971 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319971",
          "name" : "VDB-319971 | givanz Vvveb edit.tpl cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628296",
          "name" : "Submit #628296 | Vvveb 1.0.5 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in givanz Vvveb up to 1.0.5. This affects an unknown part of the file admin/template/content/edit.tpl. The manipulation of the argument slug leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.6 is able to address this issue. The patch is named 84c11d69df8452dc378feecd17e2a62ac10dac66. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vvveb:vvveb:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-18T15:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55716",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-statistics/vulnerability/wordpress-wp-statistics-plugin-plugin-14-15-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-statistics/vulnerability/wordpress-wp-statistics-plugin-plugin-14-15-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in VeronaLabs WP Statistics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Statistics: from n/a through 14.15."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55714",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-elements/vulnerability/wordpress-jetelements-for-elementor-plugin-plugin-2-7-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-elements/vulnerability/wordpress-jetelements-for-elementor-plugin-plugin-2-7-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetElements For Elementor allows Stored XSS. This issue affects JetElements For Elementor: from n/a through 2.7.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55713",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/blocksy/vulnerability/wordpress-blocksy-theme-theme-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/blocksy/vulnerability/wordpress-blocksy-theme-theme-2-1-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeThemes Blocksy allows Stored XSS. This issue affects Blocksy: from n/a through 2.1.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55712",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/the-plus-addons-for-elementor-page-builder/vulnerability/wordpress-the-plus-addons-for-elementor-page-builder-lite-plugin-plugin-6-3-13-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/the-plus-addons-for-elementor-page-builder/vulnerability/wordpress-the-plus-addons-for-elementor-page-builder-lite-plugin-plugin-6-3-13-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in POSIMYTH The Plus Addons for Elementor Page Builder Lite allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects The Plus Addons for Elementor Page Builder Lite: from n/a through 6.3.13."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55711",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-table-builder/vulnerability/wordpress-wp-table-builder-plugin-plugin-2-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-table-builder/vulnerability/wordpress-wp-table-builder-plugin-plugin-2-0-12-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WP Table Builder WP Table Builder allows Stored XSS. This issue affects WP Table Builder: from n/a through 2.0.12."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55710",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-tags/vulnerability/wordpress-taxopress-plugin-plugin-3-37-2-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-tags/vulnerability/wordpress-taxopress-plugin-plugin-3-37-2-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Steve Burge TaxoPress allows Retrieve Embedded Sensitive Data. This issue affects TaxoPress: from n/a through 3.37.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55709",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/visualcomposer/vulnerability/wordpress-visual-composer-website-builder-plugin-plugin-45-15-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/visualcomposer/vulnerability/wordpress-visual-composer-website-builder-plugin-plugin-45-15-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Visual Composer Visual Composer Website Builder allows Stored XSS. This issue affects Visual Composer Website Builder: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55708",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/quiz-master-next/vulnerability/wordpress-quiz-and-survey-master-plugin-plugin-10-2-4-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/quiz-master-next/vulnerability/wordpress-quiz-and-survey-master-plugin-plugin-10-2-4-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Systems Quiz And Survey Master allows SQL Injection. This issue affects Quiz And Survey Master: from n/a through 10.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54749",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-woo-product-gallery/vulnerability/wordpress-jetproductgallery-plugin-plugin-2-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-woo-product-gallery/vulnerability/wordpress-jetproductgallery-plugin-plugin-2-2-0-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetProductGallery allows Stored XSS. This issue affects JetProductGallery: from n/a through 2.2.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54747",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/templatera/vulnerability/wordpress-templatera-plugin-plugin-2-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/templatera/vulnerability/wordpress-templatera-plugin-plugin-2-3-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in wpbakery Templatera allows DOM-Based XSS. This issue affects Templatera: from n/a through 2.3.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54746",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/shortcode-redirect/vulnerability/wordpress-shortcode-redirect-plugin-plugin-1-0-02-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/shortcode-redirect/vulnerability/wordpress-shortcode-redirect-plugin-plugin-1-0-02-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cartpauj Shortcode Redirect allows Stored XSS. This issue affects Shortcode Redirect: from n/a through 1.0.02."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54740",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/print-my-blog/vulnerability/wordpress-print-my-blog-plugin-plugin-3-27-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/print-my-blog/vulnerability/wordpress-print-my-blog-plugin-plugin-3-27-9-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Michael Nelson Print My Blog allows Stored XSS. This issue affects Print My Blog: from n/a through 3.27.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54739",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/the-plus-addons-for-block-editor/vulnerability/wordpress-nexter-blocks-plugin-plugin-4-5-4-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/the-plus-addons-for-block-editor/vulnerability/wordpress-nexter-blocks-plugin-plugin-4-5-4-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in POSIMYTH Nexter Blocks allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Nexter Blocks: from n/a through 4.5.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54736",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/savoy/vulnerability/wordpress-savoy-theme-plugin-3-0-8-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/savoy/vulnerability/wordpress-savoy-theme-plugin-3-0-8-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in NordicMade Savoy allows Retrieve Embedded Sensitive Data. This issue affects Savoy: from n/a through 3.0.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54732",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wpdm-premium-packages/vulnerability/wordpress-wpdm-premium-packages-plugin-plugin-6-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wpdm-premium-packages/vulnerability/wordpress-wpdm-premium-packages-plugin-plugin-6-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Shahjada WPDM – Premium Packages allows Cross Site Request Forgery. This issue affects WPDM – Premium Packages: from n/a through 6.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54730",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/embedder-for-google-reviews/vulnerability/wordpress-embedder-for-google-reviews-plugin-plugin-1-7-3-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/embedder-for-google-reviews/vulnerability/wordpress-embedder-for-google-reviews-plugin-plugin-1-7-3-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in PARETO Digital Embedder for Google Reviews allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Embedder for Google Reviews: from n/a through 1.7.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54729",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/webba-booking-lite/vulnerability/wordpress-webba-booking-plugin-plugin-6-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/webba-booking-lite/vulnerability/wordpress-webba-booking-plugin-plugin-6-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webba Appointment Booking Webba Booking allows Stored XSS. This issue affects Webba Booking: from n/a through 6.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54728",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cm-on-demand-search-and-replace/vulnerability/wordpress-cm-on-demand-search-and-replace-plugin-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cm-on-demand-search-and-replace/vulnerability/wordpress-cm-on-demand-search-and-replace-plugin-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in CreativeMindsSolutions CM On Demand Search And Replace allows Cross Site Request Forgery. This issue affects CM On Demand Search And Replace: from n/a through 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54727",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cm-on-demand-search-and-replace/vulnerability/wordpress-cm-on-demand-search-and-replace-plugin-plugin-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cm-on-demand-search-and-replace/vulnerability/wordpress-cm-on-demand-search-and-replace-plugin-plugin-1-5-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CreativeMindsSolutions CM On Demand Search And Replace allows Stored XSS. This issue affects CM On Demand Search And Replace: from n/a through 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54717",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-membership/vulnerability/wordpress-wp-membership-plugin-plugin-1-6-3-settings-change-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-membership/vulnerability/wordpress-wp-membership-plugin-plugin-1-6-3-settings-change-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in e-plugins WP Membership allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Membership: from n/a through 1.6.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54715",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/vulnerability/wordpress-barcode-scanner-with-inventory-order-manager-plugin-plugin-1-9-0-arbitrary-file-download-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/barcode-scanner-lite-pos-to-manage-products-inventory-and-orders/vulnerability/wordpress-barcode-scanner-with-inventory-order-manager-plugin-plugin-1-9-0-arbitrary-file-download-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Dmitry V. (CEO of \"UKR Solution\") Barcode Scanner with Inventory & Order Manager allows Path Traversal. This issue affects Barcode Scanner with Inventory & Order Manager: from n/a through 1.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54712",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/easy-elementor-addons/vulnerability/wordpress-easy-elementor-addons-plugin-plugin-2-2-7-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/easy-elementor-addons/vulnerability/wordpress-easy-elementor-addons-plugin-plugin-2-2-7-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in hashthemes Easy Elementor Addons allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Easy Elementor Addons: from n/a through 2.2.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54708",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/b-blocks/vulnerability/wordpress-b-blocks-plugin-plugin-2-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/b-blocks/vulnerability/wordpress-b-blocks-plugin-plugin-2-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bPlugins B Blocks allows DOM-Based XSS. This issue affects B Blocks: from n/a through 2.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54054",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/12-step-meeting-list/vulnerability/wordpress-12-step-meeting-list-plugin-plugin-3-18-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/12-step-meeting-list/vulnerability/wordpress-12-step-meeting-list-plugin-plugin-3-18-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in AA Web Servant 12 Step Meeting List allows Stored XSS. This issue affects 12 Step Meeting List: from n/a through 3.18.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53587",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/findgo/vulnerability/wordpress-findgo-theme-theme-1-3-57-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/findgo/vulnerability/wordpress-findgo-theme-theme-1-3-57-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in ApusTheme Findgo allows Cross Site Request Forgery. This issue affects Findgo: from n/a through 1.3.57."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53582",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wordlift/vulnerability/wordpress-wordlift-plugin-plugin-3-54-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wordlift/vulnerability/wordpress-wordlift-plugin-plugin-3-54-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WordLift WordLift allows Stored XSS. This issue affects WordLift: from n/a through 3.54.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53581",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/rss-feed-pro/vulnerability/wordpress-rss-feed-pro-plugin-plugin-1-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/rss-feed-pro/vulnerability/wordpress-rss-feed-pro-plugin-plugin-1-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in artiosmedia RSS Feed Pro allows Stored XSS. This issue affects RSS Feed Pro: from n/a through 1.1.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53575",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/primer-mydata/vulnerability/wordpress-primer-mydata-for-woocommerce-plugin-plugin-4-2-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/primer-mydata/vulnerability/wordpress-primer-mydata-for-woocommerce-plugin-plugin-4-2-5-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in primersoftware Primer MyData for Woocommerce allows Reflected XSS. This issue affects Primer MyData for Woocommerce: from n/a through 4.2.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53347",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/kalium/vulnerability/wordpress-kalium-theme-plugin-3-18-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/kalium/vulnerability/wordpress-kalium-theme-plugin-3-18-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Laborator Kalium allows Cross Site Request Forgery. This issue affects Kalium: from n/a through 3.18.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53343",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/modernize/vulnerability/wordpress-modernize-theme-theme-3-4-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/modernize/vulnerability/wordpress-modernize-theme-theme-3-4-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in GoodLayers Modernize allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Modernize: from n/a through 3.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53342",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/modernize/vulnerability/wordpress-modernize-theme-theme-3-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/modernize/vulnerability/wordpress-modernize-theme-theme-3-4-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in GoodLayers Modernize allows Stored XSS. This issue affects Modernize: from n/a through 3.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53341",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/stratus/vulnerability/wordpress-stratus-theme-theme-4-2-5-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/stratus/vulnerability/wordpress-stratus-theme-theme-4-2-5-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Themovation Stratus allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Stratus: from n/a through 4.2.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53330",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/wprentals/vulnerability/wordpress-wp-rentals-theme-theme-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/wprentals/vulnerability/wordpress-wp-rentals-theme-theme-3-13-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WpEstate WP Rentals allows Stored XSS. This issue affects WP Rentals: from n/a through 3.13.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53249",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/build-app-online/vulnerability/wordpress-build-app-online-plugin-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/build-app-online/vulnerability/wordpress-build-app-online-plugin-plugin-1-0-23-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in hakeemnala Build App Online allows Cross Site Request Forgery. This issue affects Build App Online: from n/a through 1.0.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53241",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simplified/vulnerability/wordpress-simplified-plugin-plugin-1-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simplified/vulnerability/wordpress-simplified-plugin-plugin-1-0-9-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-Side Request Forgery (SSRF) vulnerability in kodeshpa Simplified allows Server Side Request Forgery. This issue affects Simplified: from n/a through 1.0.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53221",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/codeablepress-simple-frontend-profile-picture-upload/vulnerability/wordpress-codeablepress-plugin-plugin-1-0-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/codeablepress-simple-frontend-profile-picture-upload/vulnerability/wordpress-codeablepress-plugin-plugin-1-0-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in codeablepress CodeablePress allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects CodeablePress: from n/a through 1.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53219",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-database-optimizer-tools/vulnerability/wordpress-wp-database-optimizer-tools-plugin-plugin-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-database-optimizer-tools/vulnerability/wordpress-wp-database-optimizer-tools-plugin-plugin-0-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in pl4g4 WP-Database-Optimizer-Tools allows Cross Site Request Forgery. This issue affects WP-Database-Optimizer-Tools: from n/a through 0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52797",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-storymap/vulnerability/wordpress-storymap-plugin-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-storymap/vulnerability/wordpress-storymap-plugin-plugin-2-1-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in josepsitjar StoryMap allows SQL Injection. This issue affects StoryMap: from n/a through 2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52771",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/video-expander/vulnerability/wordpress-video-expander-plugin-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/video-expander/vulnerability/wordpress-video-expander-plugin-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in bcupham Video Expander allows Stored XSS. This issue affects Video Expander: from n/a through 1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52769",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/flexo-social-gallery/vulnerability/wordpress-flexo-social-gallery-plugin-plugin-1-0006-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/flexo-social-gallery/vulnerability/wordpress-flexo-social-gallery-plugin-plugin-1-0006-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in flexostudio flexo-social-gallery allows Cross Site Request Forgery. This issue affects flexo-social-gallery: from n/a through 1.0006."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52767",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/netinsight-analytics-implementation-plugin/vulnerability/wordpress-netinsight-analytics-implementation-plugin-plugin-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/netinsight-analytics-implementation-plugin/vulnerability/wordpress-netinsight-analytics-implementation-plugin-plugin-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in lisensee NetInsight Analytics Implementation Plugin allows Cross Site Request Forgery. This issue affects NetInsight Analytics Implementation Plugin: from n/a through 1.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52765",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/netinsight-analytics-implementation-plugin/vulnerability/wordpress-netinsight-analytics-implementation-plugin-plugin-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability-2?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/netinsight-analytics-implementation-plugin/vulnerability/wordpress-netinsight-analytics-implementation-plugin-plugin-plugin-1-0-3-cross-site-request-forgery-csrf-vulnerability-2?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in lisensee NetInsight Analytics Implementation Plugin allows Stored XSS. This issue affects NetInsight Analytics Implementation Plugin: from n/a through 1.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T19:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8974",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          }, {
            "lang" : "en",
            "value" : "CWE-259"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/linlinjava/litemall/issues/568",
          "name" : "https://github.com/linlinjava/litemall/issues/568",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/568#issue-3289860066",
          "name" : "https://github.com/linlinjava/litemall/issues/568#issue-3289860066",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319970",
          "name" : "VDB-319970 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319970",
          "name" : "VDB-319970 | linlinjava litemall JSON Web Token JwtHelper.java hard-coded credentials",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628233",
          "name" : "Submit #628233 | linlinjava litemall = v1.8.0 Hardcoded JWT Secret(CWE-798)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in linlinjava litemall up to 1.8.0. Affected by this issue is some unknown functionality of the file litemall-wx-api/src/main/java/org/linlinjava/litemall/wx/util/JwtHelper.java of the component JSON Web Token Handler. The manipulation of the argument SECRET with the input X-Litemall-Token leads to hard-coded credentials. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8973",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/30",
          "name" : "https://github.com/zzb1388/cve/issues/30",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319968",
          "name" : "VDB-319968 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319968",
          "name" : "VDB-319968 | SourceCodester Cashier Queuing System Actions.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628169",
          "name" : "Submit #628169 | sourcecodester Cashier Queuing System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/zzb1388/cve/issues/30",
          "name" : "https://github.com/zzb1388/cve/issues/30",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SourceCodester Cashier Queuing System 1.0. Affected is an unknown function of the file /Actions.php. The manipulation of the argument Username leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8972",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/31",
          "name" : "https://github.com/zzb1388/cve/issues/31",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319967",
          "name" : "VDB-319967 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319967",
          "name" : "VDB-319967 | itsourcecode Online Tour and Travel Management System page-login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628168",
          "name" : "Submit #628168 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/page-login.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52335",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://eyoucms.com",
          "name" : "http://eyoucms.com",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://sour-burglar-bfe.notion.site/CVE-2025-52335-24e2b2fd021080da9667e7608c801180",
          "name" : "https://sour-burglar-bfe.notion.site/CVE-2025-52335-24e2b2fd021080da9667e7608c801180",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EyouCMS 1.7.3 is vulnerale to Cross Site Scripting (XSS) in index.php, which can be exploited to obtain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eyoucms:eyoucms:1.7.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51986",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/jyjsunny/a9743a718ed3081b034c11201803f6b4",
          "name" : "https://gist.github.com/jyjsunny/a9743a718ed3081b034c11201803f6b4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in the demo/LINUXTCP implementation of cwalter-at freemodbus v.2018-09-12 allowing attackers to reach an infinite loop via a crafted length value for a packet."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21110",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356822/dsa-2025-313-security-update-for-dell-data-lakehouse-multiple-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356822/dsa-2025-313-security-update-for-dell-data-lakehouse-multiple-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Data Lakehouse, versions prior to 1.5.0.0, contains an Execution with Unnecessary Privileges vulnerability. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:data_lakehouse:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.5.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-18T14:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-37945",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wpbits-addons-for-elementor/vulnerability/wordpress-wpbits-addons-for-elementor-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wpbits-addons-for-elementor/vulnerability/wordpress-wpbits-addons-for-elementor-plugin-1-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPBits WPBITS Addons For Elementor Page Builder allows Stored XSS.This issue affects WPBITS Addons For Elementor Page Builder: from n/a through 1.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-43687",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.malwarebytes.com/secure/cves/cve-2023-43687",
          "name" : "https://www.malwarebytes.com/secure/cves/cve-2023-43687",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Malwarebytes before 4.6.14.326 and before 5.1.5.116 (and Nebula 2020-10-21 and later). There is a Race condition that leads to code execution because of a lack of locks between file verification and execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9043",
        "ASSIGNER" : "psirt@seagate.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Tiger3080/CVE-2025-9043",
          "name" : "https://github.com/Tiger3080/CVE-2025-9043",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.seagate.com/support/software/toolkit/",
          "name" : "https://www.seagate.com/support/software/toolkit/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The service executable path in Seagate Toolkit on Versions prior to 2.34.0.33 on Windows allows an attacker with Admin privileges to exploit a vulnerability as classified under CWE-428: Unquoted Search Path or Element. An attacker with write permissions to the root could place a malicious Program.exe file, which would execute with SYSTEM privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9039",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-018/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-018/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/aws/amazon-ecs-agent/releases/tag/v1.97.1",
          "name" : "https://github.com/aws/amazon-ecs-agent/releases/tag/v1.97.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/aws/amazon-ecs-agent/security/advisories/GHSA-wm7x-ww72-r77q",
          "name" : "https://github.com/aws/amazon-ecs-agent/security/advisories/GHSA-wm7x-ww72-r77q",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "We identified an issue in the Amazon ECS agent where, under certain conditions, an introspection server could be accessed off-host by another instance if the instances are in the same security group or if their security groups allow incoming connections that include the port where the server is hosted. This issue does not affect instances where the option to allow off-host access to the introspection server is set to 'false'.\n\nThis issue has been addressed in ECS agent version 1.97.1. We recommend upgrading to the latest version and ensuring any forked or derivative code is patched to incorporate the new fixes. \n\nIf customers cannot update to the latest AMI, they can modify the Amazon EC2 security groups to restrict incoming access to the introspection server port (51678)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8971",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/32",
          "name" : "https://github.com/zzb1388/cve/issues/32",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319966",
          "name" : "VDB-319966 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319966",
          "name" : "VDB-319966 | itsourcecode Online Tour and Travel Management System travellers.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628167",
          "name" : "Submit #628167 | itsourcecode Online Tour and Travel Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1.0. This vulnerability affects unknown code of the file /admin/operations/travellers.php. The manipulation of the argument val-username leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-18T14:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8970",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/33",
          "name" : "https://github.com/zzb1388/cve/issues/33",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319965",
          "name" : "VDB-319965 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319965",
          "name" : "VDB-319965 | itsourcecode Online Tour and Travel Management System booking.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628166",
          "name" : "Submit #628166 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This affects an unknown part of the file /admin/operations/booking.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-18T14:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8969",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/34",
          "name" : "https://github.com/zzb1388/cve/issues/34",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319964",
          "name" : "VDB-319964 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319964",
          "name" : "VDB-319964 | itsourcecode Online Tour and Travel Management System approve_user.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628165",
          "name" : "Submit #628165 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Online Tour and Travel Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/approve_user.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-18T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8968",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/35",
          "name" : "https://github.com/zzb1388/cve/issues/35",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319963",
          "name" : "VDB-319963 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319963",
          "name" : "VDB-319963 | itsourcecode Online Tour and Travel Management System disapprove_user.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628164",
          "name" : "Submit #628164 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/zzb1388/cve/issues/35",
          "name" : "https://github.com/zzb1388/cve/issues/35",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in itsourcecode Online Tour and Travel Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/disapprove_user.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-18T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55195",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b",
          "name" : "https://github.com/denoland/std/commit/540662cfd6d71e969af292aa604ef4049dbe271b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/denoland/std/releases/tag/release-2025.08.13",
          "name" : "https://github.com/denoland/std/releases/tag/release-2025.08.13",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r",
          "name" : "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r",
          "name" : "https://github.com/denoland/std/security/advisories/GHSA-crjp-8r9q-2j9r",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "@std/toml is the Deno Standard Library. Prior to version 1.0.9, an attacker can pollute the prototype chain in Node.js runtime and Browser when parsing untrusted TOML data, thus achieving Prototype Pollution (PP) vulnerability. This is because the library is merging an untrusted object with an empty object, which by default the empty object has the prototype chain. This issue has been patched in version 1.0.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55192",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JurajNyiri/HomeAssistant-Tapo-Control/commit/2a3b80ff128ddf4f410c97dd47a94343792ce43c",
          "name" : "https://github.com/JurajNyiri/HomeAssistant-Tapo-Control/commit/2a3b80ff128ddf4f410c97dd47a94343792ce43c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JurajNyiri/HomeAssistant-Tapo-Control/security/advisories/GHSA-xccg-43hx-c846",
          "name" : "https://github.com/JurajNyiri/HomeAssistant-Tapo-Control/security/advisories/GHSA-xccg-43hx-c846",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HomeAssistant-Tapo-Control offers Control for Tapo cameras as a Home Assistant component. Prior to commit 2a3b80f, there is a code injection vulnerability in the GitHub Actions workflow .github/workflows/issues.yml. It does not affect users of the Home Assistant integration itself — it only impacts the GitHub Actions environment for this repository. The vulnerable workflow directly inserted user-controlled content from the issue body (github.event.issue.body) into a Bash conditional without proper sanitization. A malicious GitHub user could craft an issue body that executes arbitrary commands on the GitHub Actions runner in a privileged context whenever an issue is opened. The potential impact is limited to the repository’s CI/CD environment, which could allow access to repository contents or GitHub Actions secrets. This issue has been patched via commit 2a3b80f. Workarounds involve disabling the affected workflow (issues.yml), replacing the unsafe Bash comparison with a safe quoted grep (or a pure GitHub Actions expression check), or ensuring minimal permissions in workflows (permissions: block) to reduce possible impact."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50817",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PythonCharmers/python-future",
          "name" : "https://github.com/PythonCharmers/python-future",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4",
          "name" : "https://medium.com/@abcd_68700/cve-2025-50817-python-future-module-arbitrary-code-execution-via-unintended-import-of-test-py-f0818ea93cf4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://pypi.org/project/future/",
          "name" : "https://pypi.org/project/future/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Python-Future 1.0.0 module allows for arbitrary code execution via the unintended import of a file named test.py. When the module is loaded, it automatically imports test.py, if present in the same directory or in the sys.path. This behavior can be exploited by an attacker who has the ability to write files to the server, allowing the execution of arbitrary code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50515",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/Master-0-0/5debd3fbda86edabb1ee80e25c029663",
          "name" : "https://gist.github.com/Master-0-0/5debd3fbda86edabb1ee80e25c029663",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.yuque.com/lcc316/df0kgm/bfzpfvb6yaat45nt",
          "name" : "https://www.yuque.com/lcc316/df0kgm/bfzpfvb6yaat45nt",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in phome Empirebak 2010 in ebak2008/upload/class/config.php allowing attackers to execute arbitrary code when the config file was loaded."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20306",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-cmd-inj-HCRLpFyN",
          "name" : "cisco-sa-fmc-cmd-inj-HCRLpFyN",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker with Administrator-level privileges to execute arbitrary commands on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient input validation of certain HTTP request parameters that are sent to the web-based management interface. An attacker could exploit this vulnerability by authenticating to the interface and sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to execute commands as the root&nbsp;user on the affected device. To exploit this vulnerability, an attacker would need&nbsp;Administrator-level credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20302",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu",
          "name" : "cisco-sa-fmc-authz-bypass-M7xhnAu",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to retrieve a generated report from a different domain.\r\n\r\nThis vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a generated report file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to access a previously run report for a different domain, which could allow an attacker to read activity recorded in that domain."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20301",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-authz-bypass-M7xhnAu",
          "name" : "cisco-sa-fmc-authz-bypass-M7xhnAu",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure FMC Software could allow an authenticated, low-privileged, remote attacker to access troubleshoot files for a different domain.\r\n\r\nThis vulnerability is due to missing authorization checks. An attacker could exploit this vulnerability by directly accessing a troubleshoot file for a different domain that is managed on the same Cisco Secure FMC instance. A successful exploit could allow the attacker to retrieve a troubleshoot file for a different domain, which could allow the attacker to access sensitive information contained in the troubleshoot file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20268",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-229"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-ravpn-geobypass-9h38M37Z",
          "name" : "cisco-sa-ftd-ravpn-geobypass-9h38M37Z",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Geolocation-Based Remote Access (RA) VPN feature of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured policies to allow or deny HTTP connections based on a country or region.\r\n\r\nThis vulnerability exists because the URL string is not fully parsed. An attacker could exploit this vulnerability by sending a crafted HTTP connection through the targeted device. A successful exploit could allow the attacker to bypass configured policies and gain access to a network where the connection should have been denied."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20265",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-radius-rce-TNBKf79",
          "name" : "cisco-sa-fmc-radius-rce-TNBKf79",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/",
          "name" : "https://www.bleepingcomputer.com/news/security/cisco-warns-of-max-severity-flaw-in-firewall-management-center/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/",
          "name" : "https://www.theregister.com/2025/08/15/cisco_secure_firewall_management_bug/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the RADIUS subsystem implementation of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to inject arbitrary shell commands that are executed by the device.&nbsp;\r\n\r\nThis vulnerability is due to a lack of proper handling of user input during the authentication phase. An attacker could exploit this vulnerability by sending crafted input when entering credentials that will be authenticated at the configured RADIUS server. A successful exploit could allow the attacker to execute commands at a high&nbsp;privilege level.\r\nNote: For this vulnerability to be exploited, Cisco Secure FMC Software must be configured for RADIUS authentication for the web-based management interface, SSH management, or both."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_firewall_management_center:7.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_firewall_management_center:7.7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-16T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20263",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-680"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-buffer-overflow-PyRUhWBC",
          "name" : "cisco-sa-asa-buffer-overflow-PyRUhWBC",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web services interface of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a buffer overflow on an affected system.&nbsp;\r\n\r\nThis vulnerability is due to insufficient boundary checks for specific data that is provided to the web services interface of an affected system. An attacker could exploit this vulnerability by sending a crafted HTTP request to the affected system. A successful exploit could allow the attacker to cause a buffer overflow condition on the affected system, which could cause the system to reload, resulting in a denial of service (DoS) condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20254",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20253",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the IKEv2 feature of Cisco IOS Software, IOS XE Software, Secure Firewall ASA Software, and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to the improper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause an infinite loop that exhausts resources and could cause the device to reload."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20252",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20251",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-http-file-hUyX2jL4",
          "name" : "cisco-sa-asaftd-http-file-hUyX2jL4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, remote attacker to create or delete arbitrary files on the underlying operating system. If critical system files are manipulated, new Remote Access SSL VPN sessions could be denied and existing sessions could be dropped, causing a denial of service (DoS) condition. An exploited device requires a manual reboot to recover.\r\n\r\nThis vulnerability is due to insufficient input validation when processing HTTP requests. An attacker could exploit this vulnerability by sending crafted HTTP requests to an affected device. A successful exploit could allow the attacker to create or delete files on the underlying operating system, which could cause the Remote Access SSL VPN service to become unresponsive.\r\nTo exploit this vulnerability, the attacker must be authenticated as a VPN user of the affected device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20244",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
          "name" : "cisco-sa-asaftd-vpnwebs-dos-hjBhmBsX",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Remote Access SSL VPN service for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow a remote attacker that is authenticated as a VPN user to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to incomplete error checking when parsing an HTTP header field value. An attacker could exploit this vulnerability by sending a crafted HTTP request to a targeted Remote Access SSL VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition, which would cause the affected device to reload."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20243",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "name" : "cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the management and VPN web servers of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to improper validation of user-supplied input on an interface with VPN web services. An attacker could exploit this vulnerability by sending crafted HTTP requests to a targeted web server on an affected device. A successful exploit could allow the attacker to cause a DoS condition when the device reloads."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20239",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20238",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1244"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3",
          "name" : "cisco-sa-asaftd-cmdinj-VEhFeZQ3",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20237",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-146"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-cmdinj-VEhFeZQ3",
          "name" : "cisco-sa-asaftd-cmdinj-VEhFeZQ3",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system with root-level privileges. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r This vulnerability is due to insufficient input validation of commands that are supplied by the user. An attacker could exploit this vulnerability by authenticating to a device and submitting crafted input for specific commands. A successful exploit could allow the attacker to execute commands on the underlying operating system as root."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20235",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xss-JtNmcusP",
          "name" : "cisco-sa-fmc-xss-JtNmcusP",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an unauthenticated, remote attacker to conduct a cross-site scripting (XSS) attack against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface. An attacker could exploit this vulnerability by inserting crafted input into various data fields in an affected interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the interface or access sensitive, browser-based information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20225",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) feature of Cisco IOS Software, IOS XE Software, Secure Firewall Adaptive Security Appliance (ASA) Software, and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to a lack of proper processing of IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device. In the case of Cisco IOS and IOS XE Software, a successful exploit could allow the attacker to cause the device to reload unexpectedly. In the case of Cisco ASA and FTD Software, a successful exploit could allow the attacker to partially exhaust system memory, causing system instability such as being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20224",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "name" : "cisco-sa-asa-ftd-ios-dos-DOESHWHy",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to trigger a memory leak, resulting in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper parsing of IKEv2 packets. An attacker could exploit this vulnerability by sending a continuous stream of crafted IKEv2 packets to an affected device. A successful exploit could allow the attacker to partially exhaust system memory, causing system instability like being unable to establish new IKEv2 VPN sessions. A manual reboot of the device is required to recover from this condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20222",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
          "name" : "cisco-sa-fp2k-IPsec-dos-tjwgdZCO",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the RADIUS proxy feature for the IPsec VPN feature of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper processing of IPv6 packets. An attacker could exploit this vulnerability by sending IPv6 packets over an IPsec VPN connection to&nbsp;an affected device. A successful exploit could allow the attacker to trigger a reload of the device, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20220",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-ftd-cmdinj-PhE7kmT",
          "name" : "cisco-sa-fmc-ftd-cmdinj-PhE7kmT",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the CLI of Cisco Secure Firewall Management Center (FMC) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system as root.\r\n\r This vulnerability is due to improper input validation for specific CLI commands. An attacker could exploit this vulnerability by injecting operating system commands into a legitimate command. A successful exploit could allow the attacker to escape the restricted command prompt and execute arbitrary commands on the underlying operating system. To successfully exploit this vulnerability, an attacker would need valid Administrator credentials.\r\n\r For more information about vulnerable scenarios, see the Details [\"#details\"] section of this advisory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20219",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asa-ftd-acl-bypass-mtPze9Yh",
          "name" : "cisco-sa-asa-ftd-acl-bypass-mtPze9Yh",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the implementation of access control rules for loopback interfaces in Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to send traffic that should have been blocked to a loopback interface.\r\n\r\nThis vulnerability is due to improper enforcement of access control rules for loopback interfaces. An attacker could exploit this vulnerability by sending traffic to a loopback interface on an affected device. A successful exploit could allow the attacker to bypass configured access control rules and send traffic&nbsp;that should have been blocked to a loopback interface on the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20218",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-643"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-xpathinj-COrThdMb",
          "name" : "cisco-sa-fmc-xpathinj-COrThdMb",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to retrieve sensitive information from an affected device.\r\n\r\nThis vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted request to the web-based management interface of an affected device. A successful exploit could allow the attacker to retrieve sensitive information from the affected device.\r\nTo exploit this vulnerability, the attacker must have valid administrative credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20217",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ftd-dos-SvKhtjgt",
          "name" : "cisco-sa-ftd-dos-SvKhtjgt",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the packet inspection functionality of the Snort 3 Detection Engine of Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to incorrect processing of traffic that is inspected by an affected device. An attacker could exploit this vulnerability by sending crafted traffic through the affected device. A successful exploit could allow the attacker to cause the affected device to enter an infinite loop while inspecting traffic, resulting in a DoS condition. The system watchdog will restart the Snort process automatically."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20148",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny",
          "name" : "cisco-sa-fmc-html-inj-MqjrZrny",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.\r\n\r\nThis vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20136",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
          "name" : "cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the function that performs IPv4 and IPv6 Network Address Translation (NAT) DNS inspection for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.&nbsp;\r\n\r\nThis vulnerability is due to an infinite loop condition that occurs when a Cisco Secure ASA or Cisco Secure FTD device processes DNS packets with DNS inspection enabled and the device is configured for NAT44, NAT64, or NAT46. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static NAT rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to create an infinite loop and cause the device to reload, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20135",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N",
          "name" : "cisco-sa-asaftd-dhcp-qj7nGs4N",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the DHCP client functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to exhaust available memory.\r\n\r\nThis vulnerability is due to improper validation of incoming DHCP packets. An attacker could exploit this vulnerability by repeatedly sending crafted DHCPv4 packets to an affected device. A successful exploit could allow the attacker to exhaust available memory, which would affect availability of services and prevent new processes from starting, resulting in a Denial of Service (DoS) condition that would require a manual reboot.\r\nNote: On Cisco Secure FTD Software, this vulnerability does not affect management interfaces."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20134",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe",
          "name" : "cisco-sa-asaftd-ssltls-dos-eHw76vZe",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static Network Address Translation (NAT) rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-19T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20133",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "name" : "cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20127",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54",
          "name" : "cisco-sa-3100_4200_tlsdos-2yNSCd54",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-43692",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.malwarebytes.com/secure/cves/cve-2023-43692",
          "name" : "https://www.malwarebytes.com/secure/cves/cve-2023-43692",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Malwarebytes before 4.6.14.326 and before 5.1.5.116 (and Nebula 2020-10-21 and later). Out-of-bound reads in strings detection utilities lead to system crashes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-43683",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.malwarebytes.com/secure/cves/cve-2023-43683",
          "name" : "https://www.malwarebytes.com/secure/cves/cve-2023-43683",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Malwarebytes 4.6.14.326 and before 5.1.5.116 (and Nebula 2020-10-21 and later). A Stack buffer out-of-bounds access exists because of an integer underflow when handling newline characters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8967",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/36",
          "name" : "https://github.com/zzb1388/cve/issues/36",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319962",
          "name" : "VDB-319962 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319962",
          "name" : "VDB-319962 | itsourcecode Online Tour and Travel Management System packages.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628163",
          "name" : "Submit #628163 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in itsourcecode Online Tour and Travel Management System 1.0. Affected is an unknown function of the file /admin/operations/packages.php. The manipulation of the argument pname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-18T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8966",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/37",
          "name" : "https://github.com/zzb1388/cve/issues/37",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319961",
          "name" : "VDB-319961 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319961",
          "name" : "VDB-319961 | itsourcecode Online Tour and Travel Management System tax.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628162",
          "name" : "Submit #628162 | itsourcecode Online Tour and Travel Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Online Tour and Travel Management System 1.0. This issue affects some unknown processing of the file /admin/operations/tax.php. The manipulation of the argument tname leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:online_tour_\\&_travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-18T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8965",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/linlinjava/litemall/issues/565",
          "name" : "https://github.com/linlinjava/litemall/issues/565",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/565#issue-3267850415",
          "name" : "https://github.com/linlinjava/litemall/issues/565#issue-3267850415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319960",
          "name" : "VDB-319960 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319960",
          "name" : "VDB-319960 | linlinjava litemall Endpoint AdminStorageController.java create unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628098",
          "name" : "Submit #628098 | linlinjava https://github.com/linlinjava/litemall  <=1.8.0 Unrestricted Upload of File with Dangerous Type (CWE-434)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in linlinjava litemall up to 1.8.0. This vulnerability affects the function create of the file litemall-admin-api/src/main/java/org/linlinjava/litemall/admin/web/AdminStorageController.java of the component Endpoint. The manipulation of the argument File leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54867",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-61"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/youki-dev/youki/commit/0d9b4f2aa5ceaf988f3eb568711d2acf0a4ace37",
          "name" : "https://github.com/youki-dev/youki/commit/0d9b4f2aa5ceaf988f3eb568711d2acf0a4ace37",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/youki-dev/youki/releases/tag/v0.5.5",
          "name" : "https://github.com/youki-dev/youki/releases/tag/v0.5.5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/youki-dev/youki/security/advisories/GHSA-j26p-6wx7-f3pw",
          "name" : "https://github.com/youki-dev/youki/security/advisories/GHSA-j26p-6wx7-f3pw",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Youki is a container runtime written in Rust. Prior to version 0.5.5, if /proc and /sys in the rootfs are symbolic links, they can potentially be exploited to gain access to the host root filesystem. This issue has been patched in version 0.5.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54409",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aide/aide/commit/54a6d0d9d5f14b81961d66373c0291bf4af4135a",
          "name" : "https://github.com/aide/aide/commit/54a6d0d9d5f14b81961d66373c0291bf4af4135a",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/aide/aide/releases/tag/v0.19.2",
          "name" : "https://github.com/aide/aide/releases/tag/v0.19.2",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/aide/aide/security/advisories/GHSA-79g7-f8rv-jcxh",
          "name" : "https://github.com/aide/aide/security/advisories/GHSA-79g7-f8rv-jcxh",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory", "Mitigation" ]
        }, {
          "url" : "https://github.com/aide/aide/security/advisories/GHSA-79g7-f8rv-jcxh",
          "name" : "https://github.com/aide/aide/security/advisories/GHSA-79g7-f8rv-jcxh",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory", "Mitigation" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AIDE is an advanced intrusion detection environment. From versions 0.13 to 0.19.1, there is a null pointer dereference vulnerability in AIDE. An attacker can crash the program during report printing or database listing after setting extended file attributes with an empty attribute value or with a key containing a comma. A local user might exploit this to cause a local denial of service. This issue has been patched in version 0.19.2. A workaround involves removing xattrs group from rules matching files on affected file systems."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:advanced_intrusion_detection_environment_project:advanced_intrusion_detection_environment:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.13",
          "versionEndExcluding" : "0.19.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-19T19:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54389",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aide/aide/commit/64c8f32b0349c33fb8382784af468338078851f9",
          "name" : "https://github.com/aide/aide/commit/64c8f32b0349c33fb8382784af468338078851f9",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/aide/aide/releases/tag/v0.19.2",
          "name" : "https://github.com/aide/aide/releases/tag/v0.19.2",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/aide/aide/security/advisories/GHSA-522j-vvx9-gg28",
          "name" : "https://github.com/aide/aide/security/advisories/GHSA-522j-vvx9-gg28",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory", "Mitigation" ]
        }, {
          "url" : "https://github.com/aide/aide/security/advisories/GHSA-522j-vvx9-gg28",
          "name" : "https://github.com/aide/aide/security/advisories/GHSA-522j-vvx9-gg28",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory", "Mitigation" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AIDE is an advanced intrusion detection environment. Prior to version 0.19.2, there is an improper output neutralization vulnerability in AIDE.  An attacker can craft a malicious filename by including terminal escape sequences to hide the addition or removal of the file from the report and/or tamper with the log output. A local user might exploit this to bypass the AIDE detection of malicious files. Additionally the output of extended attribute key names and symbolic links targets are also not properly neutralized. This issue has been patched in version 0.19.2. A workaround involves configuring AIDE to write the report output to a regular file, redirecting stdout to a regular file, or redirecting the log output written to stderr to a regular file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:advanced_intrusion_detection_environment_project:advanced_intrusion_detection_environment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.19.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-19T19:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53631",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-cj43-h8qf-7rw7",
          "name" : "https://github.com/DogukanUrker/flaskBlog/security/advisories/GHSA-cj43-h8qf-7rw7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "flaskBlog is a blog app built with Flask. In versions 2.8.1 and prior, improper sanitization of postContent when submitting POST requests to /createpost leads to arbitrary JavaScript execution (XSS) on all pages the post is reflected on including /, /post/[ID], /admin/posts, and /user/[ID] of the user that made the post. At time of publication, there are no public patches available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50518",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/IreneTheITCrowd/blog/blob/main/libcoap-vulnerability.md",
          "name" : "https://github.com/IreneTheITCrowd/blog/blob/main/libcoap-vulnerability.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/IreneTheITCrowd/blog/blob/main/libcoap-vulnerability.md",
          "name" : "https://github.com/IreneTheITCrowd/blog/blob/main/libcoap-vulnerability.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/obgm/libcoap.git",
          "name" : "https://github.com/obgm/libcoap.git",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A use-after-free vulnerability exists in the coap_delete_pdu_lkd function within coap_pdu.c of the libcoap library. This issue occurs due to improper handling of memory after the freeing of a PDU object, leading to potential memory corruption or the possibility of executing arbitrary code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36047",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242086",
          "name" : "https://www.ibm.com/support/pages/node/7242086",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM WebSphere Application Server Liberty 18.0.0.2 through 25.0.0.8 is vulnerable to a denial of service, caused by sending a specially-crafted request. A remote attacker could exploit this vulnerability to cause the server to consume memory resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
            "versionStartIncluding" : "18.0.0.2",
            "versionEndExcluding" : "25.0.0.9",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-18T17:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33142",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242172",
          "name" : "https://www.ibm.com/support/pages/node/7242172",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM WebSphere Application Server 8.5 and 9.0 could provide weaker than expected security for TLS connections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*",
            "versionStartIncluding" : "8.5.0.0",
            "versionEndExcluding" : "8.5.5.29",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:-:*:*:*",
            "versionStartIncluding" : "9.0.0.0",
            "versionEndExcluding" : "9.0.5.25",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:i:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:z\\/os:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-18T18:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-43694",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.malwarebytes.com/secure/cves/cve-2023-43694",
          "name" : "https://www.malwarebytes.com/secure/cves/cve-2023-43694",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Malwarebytes 4.6.14.326 and before and 5.1.5.116 and before (and Nebula 2020-10-21 and later). An Out of bounds read in several disassembling utilities causes stability issues and denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T16:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9042",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IY8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9041",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1737.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists due to improper handling of CIP Class 32’s request when a module is inhibited on the 5094-IF8 device. It causes the module to enter a fault state with the Module LED flashing red. Upon un-inhibiting, the module returns a connection fault (Code 16#0010), and the module cannot recover without a power cycle."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8964",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319959",
          "name" : "VDB-319959 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319959",
          "name" : "VDB-319959 | code-projects Hostel Management System Login hostel_manage.exe improper authentication",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628030",
          "name" : "Submit #628030 | code-projects Hostel Management System In C Programming With Source Code By Fabian Ros / May 25, 2025 1 Logical flaw",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx?singleDoc#",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx?singleDoc#",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ip83oyxdztulfuzx#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in code-projects Hostel Management System 1.0. This affects an unknown part of the file hostel_manage.exe of the component Login. The manipulation leads to improper authentication. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:hostel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8962",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319957",
          "name" : "VDB-319957 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319957",
          "name" : "VDB-319957 | code-projects Hostel Management System Login Form hostel_manage.exe stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628027",
          "name" : "Submit #628027 | code-projects Hostel Management System In C Programming With Source Code 1 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/cd8qfnuv9aeb1l78#de033679",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/cd8qfnuv9aeb1l78#de033679",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/cd8qfnuv9aeb1l78?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/cd8qfnuv9aeb1l78?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Hostel Management System 1.0. Affected by this vulnerability is an unknown functionality of the file hostel_manage.exe of the component Login Form. The manipulation of the argument uname leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:hostel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-19T18:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8876",
        "ASSIGNER" : "psirt@n-able.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/",
          "name" : "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Input Validation vulnerability in N-able N-central allows OS Command Injection.This issue affects N-central: before 2025.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:n-able:n-central:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.3.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8875",
        "ASSIGNER" : "psirt@n-able.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/",
          "name" : "https://status.n-able.com/2025/08/13/announcing-the-ga-of-n-central-2025-3-1/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in N-able N-central allows Local Execution of Code.This issue affects N-central: before 2025.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:n-able:n-central:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.3.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7972",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1735.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1735.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists within the FactoryTalk Linx Network Browser. By modifying the process.env.NODE_ENV to ‘development’, the attacker can disable FTSP token validation. This bypass allows access to create, update, and delete FTLinx drivers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7971",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1734.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1734.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issues exists within Studio 5000 Logix Designer due to unsafe handling of environment variables. If the specified path lacks a valid file, Logix Designer crashes; However, it may be possible to execute malicious code without triggering a crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43983",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/CN629YJ3F4#NUgX6IB4clos",
          "name" : "https://drive.proton.me/urls/CN629YJ3F4#NUgX6IB4clos",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43983.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43983.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/KuWfi",
          "name" : "https://github.com/actuator/cve/tree/main/KuWfi",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "KuWFi CPF908-CP5 WEB5.0_LCD_20210125 devices have multiple unauthenticated access control vulnerabilities within goform/goform_set_cmd_process and goform/goform_get_cmd_process. These allow an unauthenticated attacker to retrieve sensitive information (including the device admin username and password), modify critical device settings, and send arbitrary SMS messages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40758",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-347"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-395458.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-395458.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in Mendix SAML (Mendix 10.12 compatible) (All versions < V4.0.3), Mendix SAML (Mendix 10.21 compatible) (All versions < V4.1.2), Mendix SAML (Mendix 9.24 compatible) (All versions < V3.6.21). Affected versions of the module insufficiently enforce signature validation and binding checks. This could allow unauthenticated remote attackers to hijack an account in specific SSO configurations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.8
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38745",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356351/dsa-2025-314-security-update-for-dell-openmanage-enterprise-vulnerability",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356351/dsa-2025-314-security-update-for-dell-openmanage-enterprise-vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell OpenManage Enterprise, versions 3.10, 4.0, 4.1, and 4.2, contains an Insertion of Sensitive Information into Log File vulnerability in the Backup and Restore. A low privileged attacker with remote access could potentially exploit this vulnerability, leading to Information exposure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:openmanage_enterprise:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:openmanage_enterprise:3.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:openmanage_enterprise:4.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:openmanage_enterprise:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-19T19:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38738",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SupportAssist for Home PCs Installer exe version(s) 4.8.2.29006 and prior, contain(s) an Incorrect Privilege Assignment vulnerability in the Installer. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.8.2.38851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-18T18:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36613",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SupportAssist for Home PCs versions 4.6.3 and prior and SupportAssist for Business PCs versions 4.5.3 and prior, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to unauthorized access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.9.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_for_home_pcs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.8.2.38851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-18T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36612",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356690/dsa-2025-296-security-update-for-dell-supportassist-for-home-pcs-and-dell-supportassist-for-business-pcs-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SupportAssist for Business PCs, version(s) 4.5.3 and prior, contain(s) an Incorrect Privilege Assignment vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to elevation of privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_for_business_pcs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.9.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-18T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27847",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://espec.com",
          "name" : "https://espec.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://espec.com/na/about/detail/cve_2025_27847",
          "name" : "https://espec.com/na/about/detail/cve_2025_27847",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In ESPEC North America Web Controller 3 before 3.3.8, /api/v4/auth/ users session privileges are not revoked on logout."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27846",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://espec.com",
          "name" : "https://espec.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://espec.com/na/about/detail/cve_2025_27846",
          "name" : "https://espec.com/na/about/detail/cve_2025_27846",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In ESPEC North America Web Controller 3 before 3.3.8, an attacker with physical access can gain elevated privileges because GRUB and the BIOS are unprotected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27845",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://espec.com",
          "name" : "https://espec.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://espec.com/na/about/detail/cve_2025_27845",
          "name" : "https://espec.com/na/about/detail/cve_2025_27845",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In ESPEC North America Web Controller 3 before 3.3.4, /api/v4/auth/ with any invalid authentication request results in exposing a JWT secret. This allows for elevated permissions to the UI."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26484",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356343/dsa-2025-321-security-update-for-dell-cloudlink-vulnerability",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356343/dsa-2025-321-security-update-for-dell-cloudlink-vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell CloudLink, versions 8.0 through 8.1.1, contains an Improper Restriction of XML External Entity Reference vulnerability. A high privileged attacker with remote access could potentially exploit this vulnerability, leading to Denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:cloudlink:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0",
          "versionEndExcluding" : "8.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T15:15Z",
    "lastModifiedDate" : "2025-08-18T18:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-9036",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1740.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1740.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue in the runtime event system allows unauthenticated connections to receive a reusable API token. This token is broadcasted over a WebSocket and can be intercepted by any local client listening on the connection."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7973",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1738.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1738.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists in FactoryTalk ViewPoint version 14.0 or below due to improper handling of MSI repair operations. During a repair, attackers can hijack the cscript.exe console window, which runs with SYSTEM privileges. This can be exploited to spawn an elevated command prompt, enabling full privilege escalation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7774",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1733.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1733.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists within the 5032 16pt Digital Configurable module’s web server. Intercepted session credentials can be used within a 3-minute timeout window, allowing unauthorized users to perform privileged actions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7773",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1733.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1733.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists within the 5032 16pt Digital Configurable module’s web server. The web server’s session number increments at an interval that correlates to the last two consecutive sign in session interval, making it predictable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7353",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1732.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1732.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue exists due to the web-based debugger agent enabled on Rockwell Automation ControlLogix® Ethernet Modules. If a specific IP address is used to connect to the WDB agent, it can allow remote attackers to perform memory dumps, modify memory, and control execution flow."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55675",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/op681b4kbd7g84tfjf9omz0sxggbcv33",
          "name" : "https://lists.apache.org/thread/op681b4kbd7g84tfjf9omz0sxggbcv33",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Apache Superset contains an improper access control vulnerability in its /explore endpoint. A missing authorization check allows an authenticated user to discover metadata about datasources they do not have permission to access. By iterating through the datasource_id in the URL, an attacker can enumerate and confirm the existence and names of protected datasources, leading to sensitive information disclosure.\n\nThis issue affects Apache Superset: before 5.0.0.\n\nUsers are recommended to upgrade to version 5.0.0, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-18T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55674",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/cn49ps15ny3g2b1qzdg5mj7hp47p5jdo",
          "name" : "https://lists.apache.org/thread/cn49ps15ny3g2b1qzdg5mj7hp47p5jdo",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A bypass of the DISALLOWED_SQL_FUNCTIONS security feature in Apache Superset allows for the execution of blocked SQL functions. An attacker can use a special inline block to circumvent the denylist. This allows a user with SQL Lab access to execute functions that were intended to be disabled, leading to the disclosure of sensitive database information like the software version.\n\nThis issue affects Apache Superset: before 5.0.0.\n\nUsers are recommended to upgrade to version 5.0.0, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-18T18:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55673",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/h2hw756wk4sj4z49blvzkr5fntl9hlf8",
          "name" : "https://lists.apache.org/thread/h2hw756wk4sj4z49blvzkr5fntl9hlf8",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a guest user accesses a chart in Apache Superset, the API response from the /chart/data endpoint includes a query field in its payload. This field contains the underlying query, which improperly discloses database schema information, such as table names, to the low-privileged guest user.\n\nThis issue affects Apache Superset: before 4.1.3.\n\nUsers are recommended to upgrade to version 4.1.3, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.1.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55672",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/rvh7fdjfzxzjhcfwoz7twc2brhvochdj",
          "name" : "https://lists.apache.org/thread/rvh7fdjfzxzjhcfwoz7twc2brhvochdj",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-Site Scripting (XSS) vulnerability exists in Apache Superset's chart visualization. An authenticated user with permissions to edit charts can inject a malicious payload into a column's label. The payload is not properly sanitized and gets executed in the victim's browser when they hover over the chart, potentially leading to session hijacking or the execution of arbitrary commands on behalf of the user.\n\nThis issue affects Apache Superset: before 5.0.0.\n\nUsers are recommended to upgrade to version 5.0.0, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:superset:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43984",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/1NRPNBE678#lFyUYIRIBZO5",
          "name" : "https://drive.proton.me/urls/1NRPNBE678#lFyUYIRIBZO5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43984.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43984.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/kuwfi",
          "name" : "https://github.com/actuator/cve/tree/main/kuwfi",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.kuwfi.com/products/300mbps-industrial-router-cat4-4g-cpe-router-extender-strong-wifi-signal-suport-32wifi-users-with-sim-card-slot-95",
          "name" : "https://www.kuwfi.com/products/300mbps-industrial-router-cat4-4g-cpe-router-extender-strong-wifi-signal-suport-32wifi-users-with-sim-card-slot-95",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered on KuWFi GC111 devices (Hardware Version: CPE-LM321_V3.2, Software Version: GC111-GL-LM321_V3.0_20191211). They are vulnerable to unauthenticated /goform/goform_set_cmd_process requests. A crafted POST request, using the SSID parameter, allows remote attackers to execute arbitrary OS commands with root privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36581",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-788"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000356405/dsa-2025-299-security-update-for-dell-poweredge-server-bios-for-an-access-of-memory-location-after-end-of-buffer-vulnerability",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000356405/dsa-2025-299-security-update-for-dell-poweredge-server-bios-for-an-access-of-memory-location-after-end-of-buffer-vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell PowerEdge Platform version(s) 14G AMD BIOS v1.25.0 and prior, contain(s) an Access of Memory Location After End of Buffer vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading to Information exposure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-53946",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2024-53946.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2024-53946.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "name" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://kuwfi.com/products/kuwfi-gigabit-wireless-router-4g-lte-wifi-router-dual-band-portable-wifi-modem-hotspot-64-user-with-gigabit-wan-lan-rj11-port",
          "name" : "https://kuwfi.com/products/kuwfi-gigabit-wireless-router-4g-lte-wifi-router-dual-band-portable-wifi-modem-hotspot-64-user-with-gigabit-wan-lan-rj11-port",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The KuWFi 4G LTE AC900 router 1.0.13 is vulnerable to Cross-Site Request Forgery (CSRF) on its web management interface. This vulnerability allows an attacker to trick an authenticated admin user into performing unauthorized actions, such as exploiting a command injection vulnerability in /goform/formMultiApnSetting. Successful exploitation can also lead to unauthorized configuration changes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-53945",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2024-53945.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2024-53945.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "name" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://kuwfi.com/products/kuwfi-gigabit-wireless-router-4g-lte-wifi-router-dual-band-portable-wifi-modem-hotspot-64-user-with-gigabit-wan-lan-rj11-port",
          "name" : "https://kuwfi.com/products/kuwfi-gigabit-wireless-router-4g-lte-wifi-router-dual-band-portable-wifi-modem-hotspot-64-user-with-gigabit-wan-lan-rj11-port",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The KuWFi 4G AC900 LTE router 1.0.13 is vulnerable to command injection on the HTTP API endpoints /goform/formMultiApnSetting and /goform/atCmd. An authenticated attacker can execute arbitrary OS commands with root privileges via shell metacharacters in parameters such as pincode and cmds. Exploitation can lead to full system compromise, including enabling remote access (e.g., enabling telnet)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T14:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8963",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/jeecgboot/jimureport/issues/4010",
          "name" : "https://github.com/jeecgboot/jimureport/issues/4010",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jeecgboot/jimureport/issues/4010#issuecomment-3182053855",
          "name" : "https://github.com/jeecgboot/jimureport/issues/4010#issuecomment-3182053855",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319958",
          "name" : "VDB-319958 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319958",
          "name" : "VDB-319958 | jeecgboot JimuReport Data Large Screen Template testConnection deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628028",
          "name" : "Submit #628028 | https://qiaoqiaoyun.com/ jeecgboot/jimureport 2.1.1 PostgreSQL JDBC RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in jeecgboot JimuReport up to 2.1.1. Affected by this issue is some unknown functionality of the file /drag/onlDragDataSource/testConnection of the component Data Large Screen Template. The manipulation leads to deserialization. The attack may be launched remotely. The vendor response to the GitHub issue report is: \"Modified, next version updated\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8961",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.libtiff.org/",
          "name" : "http://www.libtiff.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/15L4q2eD8GX3Aj3z6SWC3_FbqaM1ChUx2/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/issues/721",
          "name" : "https://gitlab.com/libtiff/libtiff/-/issues/721",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960",
          "name" : "https://gitlab.com/libtiff/libtiff/-/issues/721#note_2670686960",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319955",
          "name" : "VDB-319955 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319955",
          "name" : "VDB-319955 | LibTIFF tiffcrop tiffcrop.c mai memory corruption",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627957",
          "name" : "Submit #627957 | libtiff tiffcrop 4.7.0 (the newest master) Segmentation Fault",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in LibTIFF 4.7.0. This issue affects the function May of the file tiffcrop.c of the component tiffcrop. The manipulation leads to memory corruption. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8715",
        "ASSIGNER" : "cna@postgresql.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.postgresql.org/support/security/CVE-2025-8715/",
          "name" : "https://www.postgresql.org/support/security/CVE-2025-8715/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name.  The same attacks can achieve SQL injection as a superuser of the restore target server.  pg_dumpall, pg_restore, and pg_upgrade are also affected.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.  Versions before 11.20 are unaffected.  CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8714",
        "ASSIGNER" : "cna@postgresql.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.postgresql.org/support/security/CVE-2025-8714/",
          "name" : "https://www.postgresql.org/support/security/CVE-2025-8714/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands.  pg_dumpall is also affected.  pg_restore is affected when used to generate a plain-format dump.  This is similar to MySQL CVE-2024-21096.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8713",
        "ASSIGNER" : "cna@postgresql.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.postgresql.org/support/security/CVE-2025-8713/",
          "name" : "https://www.postgresql.org/support/security/CVE-2025-8713/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access.  Separately, statistics allow a user to read sampled data that a row security policy intended to hide.  PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process.  Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies.  Reachable statistics data notably included histograms and most-common-values lists.  CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained.  Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-5342",
        "ASSIGNER" : "patrick@puiterwijk.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2023-5342",
          "name" : "https://access.redhat.com/security/cve/CVE-2023-5342",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2aa28a4cfc",
          "name" : "https://bodhi.fedoraproject.org/updates/FEDORA-2024-2aa28a4cfc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2198977",
          "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=2198977",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2388707",
          "name" : "RHBZ#2388707",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Fedora Secure Boot CA certificate shipped with shim in Fedora was expired which could lead to old or invalid signed boot components being loaded."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T13:15Z",
    "lastModifiedDate" : "2025-08-15T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8960",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.319952",
          "name" : "VDB-319952 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319952",
          "name" : "VDB-319952 | Campcodes Online Flight Booking Management System save_airlines.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627900",
          "name" : "Submit #627900 | Campcodes Online Flight Booking Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/ykgg3tumuaefd0ft#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/ykgg3tumuaefd0ft#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/ykgg3tumuaefd0ft?singleDoc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/ykgg3tumuaefd0ft?singleDoc",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Campcodes Online Flight Booking Management System 1.0. Affected by this issue is some unknown functionality of the file /admin/save_airlines.php. The manipulation of the argument ID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T12:15Z",
    "lastModifiedDate" : "2025-08-14T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8958",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/alc9700jmo/CVE/issues/16",
          "name" : "https://github.com/alc9700jmo/CVE/issues/16",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319927",
          "name" : "VDB-319927 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319927",
          "name" : "VDB-319927 | Tenda TX3 fast_setting_wifi_set stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.627861",
          "name" : "Submit #627861 | Shenzhen Tenda Technology Co., Ltd. Tenda TX3 Router Tenda TX3 Router Firmware US_TX3V1.0br_V16.03.13.11_multi_TDE01 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628117",
          "name" : "Submit #628117 | Tenda TX3 US_TX3V1.0br_V16.03.13.11_multi_TDE01 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda TX3 16.03.13.11_multi_TDE01. Affected by this vulnerability is an unknown functionality of the file /goform/fast_setting_wifi_set. The manipulation of the argument ssid leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8957",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.319926",
          "name" : "VDB-319926 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319926",
          "name" : "VDB-319926 | Campcodes Online Flight Booking Management System flights.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627840",
          "name" : "Submit #627840 | Campcodes Online Flight Booking Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/xsngklzdixvub9si#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/xsngklzdixvub9si#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/xsngklzdixvub9si?singleDoc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/xsngklzdixvub9si?singleDoc",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Campcodes Online Flight Booking Management System 1.0. Affected is an unknown function of the file /flights.php. The manipulation of the argument departure_airport_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T17:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54707",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-meta-data-filter-and-taxonomy-filter/vulnerability/wordpress-mdtf-plugin-1-3-3-7-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-meta-data-filter-and-taxonomy-filter/vulnerability/wordpress-mdtf-plugin-1-3-3-7-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RealMag777 MDTF allows SQL Injection. This issue affects MDTF: from n/a through 1.3.3.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54706",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/magical-posts-display/vulnerability/wordpress-magical-posts-display-plugin-plugin-1-2-52-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/magical-posts-display/vulnerability/wordpress-magical-posts-display-plugin-plugin-1-2-52-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Magical Posts Display allows DOM-Based XSS. This issue affects Magical Posts Display: from n/a through 1.2.52."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54705",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/mage-eventpress/vulnerability/wordpress-wpevently-plugin-plugin-4-4-6-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/mage-eventpress/vulnerability/wordpress-wpevently-plugin-plugin-4-4-6-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in magepeopleteam WpEvently allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WpEvently: from n/a through 4.4.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54704",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/easy-elementor-addons/vulnerability/wordpress-easy-elementor-addons-plugin-plugin-2-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/easy-elementor-addons/vulnerability/wordpress-easy-elementor-addons-plugin-plugin-2-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hashthemes Easy Elementor Addons allows DOM-Based XSS. This issue affects Easy Elementor Addons: from n/a through 2.2.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54703",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/integrate-google-drive/vulnerability/wordpress-integrate-google-drive-plugin-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/integrate-google-drive/vulnerability/wordpress-integrate-google-drive-plugin-plugin-1-5-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Prince Integrate Google Drive allows Cross Site Request Forgery. This issue affects Integrate Google Drive: from n/a through 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54702",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ebook-store/vulnerability/wordpress-ebook-store-plugin-plugin-5-8013-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ebook-store/vulnerability/wordpress-ebook-store-plugin-plugin-5-8013-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in motov.net Ebook Store allows Cross Site Request Forgery. This issue affects Ebook Store: from n/a through 5.8013."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54701",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/unicamp/vulnerability/wordpress-unicamp-theme-2-6-3-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/unicamp/vulnerability/wordpress-unicamp-theme-2-6-3-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Unicamp allows PHP Local File Inclusion. This issue affects Unicamp: from n/a through 2.6.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54700",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/makeaholic/vulnerability/wordpress-makeaholic-theme-1-8-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/makeaholic/vulnerability/wordpress-makeaholic-theme-1-8-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeMove Makeaholic allows PHP Local File Inclusion. This issue affects Makeaholic: from n/a through 1.8.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54699",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-masteriyo-lms-plugin-plugin-1-18-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/learning-management-system/vulnerability/wordpress-masteriyo-lms-plugin-plugin-1-18-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in masteriyo Masteriyo - LMS allows Stored XSS. This issue affects Masteriyo - LMS: from n/a through 1.18.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54698",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/classified-listing/vulnerability/wordpress-classified-listing-plugin-plugin-5-0-0-content-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/classified-listing/vulnerability/wordpress-classified-listing-plugin-plugin-5-0-0-content-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in RadiusTheme Classified Listing allows Code Injection. This issue affects Classified Listing: from n/a through 5.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54697",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/kadence-woocommerce-email-designer/vulnerability/wordpress-kadence-woocommerce-email-designer-plugin-1-5-16-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/kadence-woocommerce-email-designer/vulnerability/wordpress-kadence-woocommerce-email-designer-plugin-1-5-16-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in Ben Ritner - Kadence WP Kadence WooCommerce Email Designer allows Privilege Escalation. This issue affects Kadence WooCommerce Email Designer: from n/a through 1.5.16."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54696",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wpfunnels/vulnerability/wordpress-wpfunnels-plugin-plugin-3-5-26-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wpfunnels/vulnerability/wordpress-wpfunnels-plugin-plugin-3-5-26-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in WPFunnels WPFunnels allows Stored XSS. This issue affects WPFunnels: from n/a through 3.5.26."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54695",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ht-mega-for-elementor/vulnerability/wordpress-ht-mega-plugin-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ht-mega-for-elementor/vulnerability/wordpress-ht-mega-plugin-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in HasTech HT Mega allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects HT Mega: from n/a through 2.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54694",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/button-block/vulnerability/wordpress-button-block-plugin-plugin-1-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/button-block/vulnerability/wordpress-button-block-plugin-plugin-1-2-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in bPlugins Button Block allows Cross Site Request Forgery. This issue affects Button Block: from n/a through 1.2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54693",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/form-block/vulnerability/wordpress-form-block-plugin-1-5-5-arbitrary-file-upload-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/form-block/vulnerability/wordpress-form-block-plugin-1-5-5-arbitrary-file-upload-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type vulnerability in epiphyt Form Block allows Upload a Web Shell to a Web Server. This issue affects Form Block: from n/a through 1.5.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54692",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/membership-for-woocommerce/vulnerability/wordpress-membership-for-woocommerce-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/membership-for-woocommerce/vulnerability/wordpress-membership-for-woocommerce-plugin-2-9-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in WP Swings Membership For WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Membership For WooCommerce: from n/a through 2.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54691",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/motors-car-dealership-classified-listings/vulnerability/wordpress-motors-plugin-plugin-1-4-80-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/motors-car-dealership-classified-listings/vulnerability/wordpress-motors-plugin-plugin-1-4-80-insecure-direct-object-references-idor-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authorization Bypass Through User-Controlled Key vulnerability in Stylemix Motors allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Motors: from n/a through 1.4.80."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54690",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/xinterio/vulnerability/wordpress-xinterio-theme-4-2-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/xinterio/vulnerability/wordpress-xinterio-theme-4-2-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in themeStek Xinterio allows PHP Local File Inclusion. This issue affects Xinterio: from n/a through 4.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54689",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/urna/vulnerability/wordpress-urna-theme-2-5-7-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/urna/vulnerability/wordpress-urna-theme-2-5-7-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in thembay Urna allows PHP Local File Inclusion. This issue affects Urna: from n/a through 2.5.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54688",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-plugin-plugin-3-7-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-engine/vulnerability/wordpress-jetengine-plugin-plugin-3-7-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetEngine allows Stored XSS. This issue affects JetEngine: from n/a through 3.7.1.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54687",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/jet-tabs/vulnerability/wordpress-jettabs-plugin-plugin-2-2-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/jet-tabs/vulnerability/wordpress-jettabs-plugin-plugin-2-2-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Crocoblock JetTabs allows DOM-Based XSS. This issue affects JetTabs: from n/a through 2.2.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54686",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/exertio/vulnerability/wordpress-exertio-theme-1-3-2-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/exertio/vulnerability/wordpress-exertio-theme-1-3-2-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in scriptsbundle Exertio allows Object Injection. This issue affects Exertio: from n/a through 1.3.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54685",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/suredash/vulnerability/wordpress-suredash-plugin-1-1-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/suredash/vulnerability/wordpress-suredash-plugin-1-1-0-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Brainstorm Force SureDash allows Retrieve Embedded Sensitive Data. This issue affects SureDash: from n/a through 1.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54684",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cf7-constant-contact/vulnerability/wordpress-integration-for-contact-form-7-and-constant-contact-plugin-plugin-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cf7-constant-contact/vulnerability/wordpress-integration-for-contact-form-7-and-constant-contact-plugin-plugin-1-1-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in CRM Perks Integration for Contact Form 7 and Constant Contact allows Stored XSS. This issue affects Integration for Contact Form 7 and Constant Contact: from n/a through 1.1.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54683",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-modal-popup-with-cookie-integration/vulnerability/wordpress-wp-modal-popup-with-cookie-integration-plugin-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-modal-popup-with-cookie-integration/vulnerability/wordpress-wp-modal-popup-with-cookie-integration-plugin-plugin-2-4-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Astoundify WP Modal Popup with Cookie Integration allows Reflected XSS. This issue affects WP Modal Popup with Cookie Integration: from n/a through 2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54682",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-gravity-forms-spreadsheets/vulnerability/wordpress-connector-for-gravity-forms-and-google-sheets-plugin-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-gravity-forms-spreadsheets/vulnerability/wordpress-connector-for-gravity-forms-and-google-sheets-plugin-plugin-1-2-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in CRM Perks Connector for Gravity Forms and Google Sheets allows Cross Site Request Forgery. This issue affects Connector for Gravity Forms and Google Sheets: from n/a through 1.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54681",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-gravity-forms-spreadsheets/vulnerability/wordpress-connector-for-gravity-forms-and-google-sheets-plugin-plugin-1-2-4-open-redirection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-gravity-forms-spreadsheets/vulnerability/wordpress-connector-for-gravity-forms-and-google-sheets-plugin-plugin-1-2-4-open-redirection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in CRM Perks Connector for Gravity Forms and Google Sheets allows Phishing. This issue affects Connector for Gravity Forms and Google Sheets: from n/a through 1.2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54680",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/blogger-buzz/vulnerability/wordpress-blogger-buzz-theme-theme-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/blogger-buzz/vulnerability/wordpress-blogger-buzz-theme-theme-1-2-6-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sparkle Themes Blogger Buzz allows Stored XSS. This issue affects Blogger Buzz: from n/a through 1.2.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54679",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/neon-channel-product-customizer-free/vulnerability/wordpress-neon-channel-product-customizer-free-plugin-2-0-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/neon-channel-product-customizer-free/vulnerability/wordpress-neon-channel-product-customizer-free-plugin-2-0-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in vertim Neon Channel Product Customizer Free allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Neon Channel Product Customizer Free: from n/a through 2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54678",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/easy-form-builder/vulnerability/wordpress-easy-form-builder-plugin-3-8-15-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/easy-form-builder/vulnerability/wordpress-easy-form-builder-plugin-3-8-15-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in hassantafreshi Easy Form Builder allows Blind SQL Injection. This issue affects Easy Form Builder: from n/a through 3.8.15."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54676",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-by-vcita-plugin-plugin-4-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/meeting-scheduler-by-vcita/vulnerability/wordpress-online-booking-scheduling-calendar-for-by-vcita-plugin-plugin-4-5-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vcita Online Booking & Scheduling Calendar for WordPress by vcita allows Stored XSS. This issue affects Online Booking & Scheduling Calendar for WordPress by vcita: from n/a through 4.5.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54675",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/yith-woocommerce-popup/vulnerability/wordpress-yith-woocommerce-popup-plugin-plugin-1-48-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/yith-woocommerce-popup/vulnerability/wordpress-yith-woocommerce-popup-plugin-plugin-1-48-0-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in YITHEMES YITH WooCommerce Popup allows Cross Site Request Forgery. This issue affects YITH WooCommerce Popup: from n/a through 1.48.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54674",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/product-configurator-for-woocommerce/vulnerability/wordpress-product-configurator-for-woocommerce-plugin-plugin-1-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/product-configurator-for-woocommerce/vulnerability/wordpress-product-configurator-for-woocommerce-plugin-plugin-1-4-4-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in mklacroix Product Configurator for WooCommerce allows Cross Site Request Forgery. This issue affects Product Configurator for WooCommerce: from n/a through 1.4.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54673",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/chart-builder/vulnerability/wordpress-chartify-plugin-plugin-3-5-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/chart-builder/vulnerability/wordpress-chartify-plugin-plugin-3-5-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Ays Pro Chartify allows Cross Site Request Forgery. This issue affects Chartify: from n/a through 3.5.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54672",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wplr-sync/vulnerability/wordpress-photo-engine-plugin-plugin-6-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wplr-sync/vulnerability/wordpress-photo-engine-plugin-plugin-6-4-3-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in Jordy Meow Photo Engine allows Cross Site Request Forgery. This issue affects Photo Engine: from n/a through 6.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54671",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/oik/vulnerability/wordpress-oik-plugin-plugin-4-15-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/oik/vulnerability/wordpress-oik-plugin-plugin-4-15-2-cross-site-request-forgery-csrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in bobbingwide oik allows Cross Site Request Forgery. This issue affects oik: from n/a through 4.15.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54669",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-7-4-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/mapsvg/vulnerability/wordpress-mapsvg-plugin-8-7-4-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in RomanCode MapSVG allows SQL Injection. This issue affects MapSVG: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54668",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-plugin-2-9-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-plugin-2-9-4-3-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Saad Iqbal myCred allows Stored XSS. This issue affects myCred: from n/a through 2.9.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54667",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-plugin-2-9-4-3-race-condition-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/mycred/vulnerability/wordpress-mycred-plugin-plugin-2-9-4-3-race-condition-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability in Saad Iqbal myCred allows Leveraging Time-of-Check and Time-of-Use (TOCTOU) Race Conditions. This issue affects myCred: from n/a through 2.9.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52823",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cubeportfolio/vulnerability/wordpress-cube-portfolio-plugin-1-16-8-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cubeportfolio/vulnerability/wordpress-cube-portfolio-plugin-1-16-8-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ovatheme Cube Portfolio allows SQL Injection. This issue affects Cube Portfolio: from n/a through 1.16.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52820",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/woo-point-of-salepos/vulnerability/wordpress-woocommerce-point-of-sale-pos-1-4-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/woo-point-of-salepos/vulnerability/wordpress-woocommerce-point-of-sale-pos-1-4-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in infosoftplugin WooCommerce Point Of Sale (POS) allows SQL Injection. This issue affects WooCommerce Point Of Sale (POS): from n/a through 1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52806",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-jobsearch/vulnerability/wordpress-jobsearch-plugin-2-9-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-jobsearch/vulnerability/wordpress-jobsearch-plugin-2-9-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in eyecix JobSearch allows PHP Local File Inclusion. This issue affects JobSearch: from n/a through 2.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52801",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/thebooking/vulnerability/wordpress-thebooking-plugin-1-4-4-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/thebooking/vulnerability/wordpress-thebooking-plugin-1-4-4-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in VonStroheim TheBooking allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects TheBooking: from n/a through 1.4.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52800",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/profitori/vulnerability/wordpress-the-e-commerce-erp-2-1-1-3-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/profitori/vulnerability/wordpress-the-e-commerce-erp-2-1-1-3-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Unity Business Technology Pty Ltd The E-Commerce ERP allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects The E-Commerce ERP: from n/a through 2.1.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52788",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/captionpix/vulnerability/wordpress-captionpix-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/captionpix/vulnerability/wordpress-captionpix-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Russell Jamieson CaptionPix allows Reflected XSS. This issue affects CaptionPix: from n/a through 1.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52785",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/smm-api/vulnerability/wordpress-smm-api-plugin-6-0-30-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/smm-api/vulnerability/wordpress-smm-api-plugin-6-0-30-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in softnwords SMM API allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects SMM API: from n/a through 6.0.30."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52775",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/project-cost-calculator/vulnerability/wordpress-project-cost-calculator-plugin-1-0-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/project-cost-calculator/vulnerability/wordpress-project-cost-calculator-plugin-1-0-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Ronik@UnlimitedWP Project Cost Calculator allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Project Cost Calculator: from n/a through 1.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52732",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/gmap-targeting/vulnerability/wordpress-google-map-targeting-plugin-1-1-6-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/gmap-targeting/vulnerability/wordpress-google-map-targeting-plugin-1-1-6-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in RealMag777 Google Map Targeting allows PHP Local File Inclusion. This issue affects Google Map Targeting: from n/a through 1.1.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52731",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/eventin-pro/vulnerability/wordpress-wordpress-event-manager-event-calendar-and-booking-plugin-plugin-4-0-24-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/eventin-pro/vulnerability/wordpress-wordpress-event-manager-event-calendar-and-booking-plugin-plugin-4-0-24-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in themefunction WordPress Event Manager, Event Calendar and Booking Plugin allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WordPress Event Manager, Event Calendar and Booking Plugin: from n/a through 4.0.24."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52730",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/eventin-pro/vulnerability/wordpress-wordpress-event-manager-event-calendar-and-booking-plugin-plugin-4-0-24-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/eventin-pro/vulnerability/wordpress-wordpress-event-manager-event-calendar-and-booking-plugin-plugin-4-0-24-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in themefunction WordPress Event Manager, Event Calendar and Booking Plugin allows Stored XSS. This issue affects WordPress Event Manager, Event Calendar and Booking Plugin: from n/a through 4.0.24."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52728",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/responsive-posts-carousel-pro/vulnerability/wordpress-responsive-posts-carousel-wordpress-plugin-plugin-15-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/responsive-posts-carousel-pro/vulnerability/wordpress-responsive-posts-carousel-wordpress-plugin-plugin-15-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WebCodingPlace Responsive Posts Carousel WordPress Plugin allows PHP Local File Inclusion. This issue affects Responsive Posts Carousel WordPress Plugin: from n/a through 15.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52721",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/global-gallery/vulnerability/wordpress-global-gallery-plugin-9-2-3-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/global-gallery/vulnerability/wordpress-global-gallery-plugin-9-2-3-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in LCweb Global Gallery allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Global Gallery: from n/a through 9.2.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52720",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/superstorefinder-wp/vulnerability/wordpress-super-store-finder-plugin-7-5-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/superstorefinder-wp/vulnerability/wordpress-super-store-finder-plugin-7-5-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in highwarden Super Store Finder allows SQL Injection. This issue affects Super Store Finder: from n/a through 7.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52716",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-rest-cache/vulnerability/wordpress-wp-rest-cache-2025-1-0-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-rest-cache/vulnerability/wordpress-wp-rest-cache-2025-1-0-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Acato WP REST Cache allows PHP Local File Inclusion. This issue affects WP REST Cache: from n/a through 2025.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52712",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-35"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/post-and-page-builder/vulnerability/wordpress-post-and-page-builder-by-boldgrid-visual-drag-and-drop-editor-1-27-8-path-traversal-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/post-and-page-builder/vulnerability/wordpress-post-and-page-builder-by-boldgrid-visual-drag-and-drop-editor-1-27-8-path-traversal-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Path Traversal vulnerability in BoldGrid Post and Page Builder by BoldGrid – Visual Drag and Drop Editor allows Path Traversal. This issue affects Post and Page Builder by BoldGrid – Visual Drag and Drop Editor: from n/a through 1.27.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50040",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cf7-spreadsheets/vulnerability/wordpress-cf7-spreadsheets-plugin-2-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cf7-spreadsheets/vulnerability/wordpress-cf7-spreadsheets-plugin-2-3-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in moshensky CF7 Spreadsheets allows Stored XSS. This issue affects CF7 Spreadsheets: from n/a through 2.3.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50031",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/db-backup/vulnerability/wordpress-db-backup-6-0-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/db-backup/vulnerability/wordpress-db-backup-6-0-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in syedamirhussain91 DB Backup allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects DB Backup: from n/a through 6.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50029",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/artificial-intelligence-auto-content-generator/vulnerability/wordpress-ai-tools-4-0-7-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/artificial-intelligence-auto-content-generator/vulnerability/wordpress-ai-tools-4-0-7-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Ashish AI Tools allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects AI Tools: from n/a through 4.0.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49887",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/product-xml-feeds-for-woocommerce/vulnerability/wordpress-product-xml-feed-manager-for-woocommerce-plugin-2-9-3-remote-code-execution-rce-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/product-xml-feeds-for-woocommerce/vulnerability/wordpress-product-xml-feed-manager-for-woocommerce-plugin-2-9-3-remote-code-execution-rce-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in WPFactory Product XML Feed Manager for WooCommerce allows Remote Code Inclusion. This issue affects Product XML Feed Manager for WooCommerce: from n/a through 2.9.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49869",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-plugin-4-0-31-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-plugin-4-0-31-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in Arraytics Eventin allows Object Injection. This issue affects Eventin: from n/a through 4.0.31."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49437",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/league-of-legends-rotation/vulnerability/wordpress-wp-lol-rotation-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/league-of-legends-rotation/vulnerability/wordpress-wp-lol-rotation-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in worstguy WP LOL Rotation allows Stored XSS. This issue affects WP LOL Rotation: from n/a through 1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49433",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/supermalink/vulnerability/wordpress-supermalink-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/supermalink/vulnerability/wordpress-supermalink-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ThanhD Supermalink allows DOM-Based XSS. This issue affects Supermalink: from n/a through 1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49271",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/gravitywp-merge-tags/vulnerability/wordpress-gravitywp-merge-tags-1-4-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/gravitywp-merge-tags/vulnerability/wordpress-gravitywp-merge-tags-1-4-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in GravityWP GravityWP - Merge Tags allows PHP Local File Inclusion. This issue affects GravityWP - Merge Tags: from n/a through 1.4.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49267",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/acf-frontend-form-element/vulnerability/wordpress-frontend-admin-by-dynamiapps-3-28-3-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/acf-frontend-form-element/vulnerability/wordpress-frontend-admin-by-dynamiapps-3-28-3-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Shabti Kaplan Frontend Admin by DynamiApps allows Blind SQL Injection. This issue affects Frontend Admin by DynamiApps: from n/a through 3.28.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49264",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cloud-sso-single-sign-on/vulnerability/wordpress-cloud-saml-sso-single-sign-on-login-1-0-18-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cloud-sso-single-sign-on/vulnerability/wordpress-cloud-saml-sso-single-sign-on-login-1-0-18-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Cloud Infrastructure Services Cloud SAML SSO - Single Sign On Login allows PHP Local File Inclusion. This issue affects Cloud SAML SSO - Single Sign On Login: from n/a through 1.0.18."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49065",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/visit-counter/vulnerability/wordpress-visit-counter-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/visit-counter/vulnerability/wordpress-visit-counter-plugin-1-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in BestiaDurmiente Visit Counter allows Stored XSS. This issue affects Visit Counter: from n/a through 1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49064",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/user-language-switch/vulnerability/wordpress-user-language-switch-plugin-1-6-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/user-language-switch/vulnerability/wordpress-user-language-switch-plugin-1-6-10-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Webilop User Language Switch allows Reflected XSS. This issue affects User Language Switch: from n/a through 1.6.10."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49063",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/i3geek-baiduxzh/vulnerability/wordpress-baiduxzh-submit-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/i3geek-baiduxzh/vulnerability/wordpress-baiduxzh-submit-plugin-1-4-6-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in i3geek BaiduXZH Submit(?????) allows Reflected XSS. This issue affects BaiduXZH Submit(?????): from n/a through 1.4.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49062",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-jscrollpane/vulnerability/wordpress-wp-jscrollpane-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-jscrollpane/vulnerability/wordpress-wp-jscrollpane-plugin-2-0-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in cornfeed WP-jScrollPane allows Reflected XSS. This issue affects WP-jScrollPane: from n/a through 2.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49061",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/porn-videos-embed/vulnerability/wordpress-porn-videos-embed-plugin-0-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/porn-videos-embed/vulnerability/wordpress-porn-videos-embed-plugin-0-9-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in perteus Porn Videos Embed allows Stored XSS. This issue affects Porn Videos Embed: from n/a through 0.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49059",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/cleverreach-wp/vulnerability/wordpress-cleverreach-wp-plugin-1-5-20-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/cleverreach-wp/vulnerability/wordpress-cleverreach-wp-plugin-1-5-20-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in CleverReach® CleverReach® WP allows SQL Injection. This issue affects CleverReach® WP: from n/a through 1.5.20."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49058",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/soundst-seo-search/vulnerability/wordpress-soundst-seo-search-plugin-1-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/soundst-seo-search/vulnerability/wordpress-soundst-seo-search-plugin-1-2-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Sound Strategies SoundSt SEO Search allows Reflected XSS. This issue affects SoundSt SEO Search: from n/a through 1.2.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49057",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-voting/vulnerability/wordpress-wp-voting-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-voting/vulnerability/wordpress-wp-voting-plugin-1-8-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Ko Min WP Voting allows Reflected XSS. This issue affects WP Voting: from n/a through 1.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49056",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/duoshuo/vulnerability/wordpress-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/duoshuo/vulnerability/wordpress-plugin-1-2-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in shen2 ???????? allows Reflected XSS. This issue affects ????????: from n/a through 1.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49054",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/time-sheets/vulnerability/wordpress-time-sheets-plugin-2-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/time-sheets/vulnerability/wordpress-time-sheets-plugin-2-1-3-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in mrdenny Time Sheets allows Reflected XSS. This issue affects Time Sheets: from n/a through 2.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49053",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/airdrop/vulnerability/wordpress-wp-airdrop-manager-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/airdrop/vulnerability/wordpress-wp-airdrop-manager-plugin-1-0-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in kadesthemes WP Airdrop Manager allows Stored XSS. This issue affects WP Airdrop Manager: from n/a through 1.0.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49052",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/netease-music/vulnerability/wordpress-netease-music-plugin-3-2-1-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/netease-music/vulnerability/wordpress-netease-music-plugin-3-2-1-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Dariolee Netease Music allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Netease Music: from n/a through 3.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49051",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/hide-text-shortcode/vulnerability/wordpress-hide-text-shortcode-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/hide-text-shortcode/vulnerability/wordpress-hide-text-shortcode-plugin-1-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in biscia7 Hide Text Shortcode allows Stored XSS. This issue affects Hide Text Shortcode: from n/a through 1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49048",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/inspectlet-heatmaps-and-user-session-recording/vulnerability/wordpress-inspectlet-user-session-recording-and-heatmaps-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/inspectlet-heatmaps-and-user-session-recording/vulnerability/wordpress-inspectlet-user-session-recording-and-heatmaps-plugin-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in inspectlet Inspectlet &#8211; User Session Recording and Heatmaps allows Stored XSS. This issue affects Inspectlet &#8211; User Session Recording and Heatmaps: from n/a through 2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49047",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/do-spaces-sync/vulnerability/wordpress-digitalocean-spaces-sync-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/do-spaces-sync/vulnerability/wordpress-digitalocean-spaces-sync-plugin-2-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in keeross DigitalOcean Spaces Sync allows Stored XSS. This issue affects DigitalOcean Spaces Sync: from n/a through 2.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49044",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/simple-poll/vulnerability/wordpress-simple-poll-plugin-1-1-1-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/simple-poll/vulnerability/wordpress-simple-poll-plugin-1-1-1-cross-site-request-forgery-csrf-to-stored-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in tosend.it Simple Poll allows Stored XSS. This issue affects Simple Poll: from n/a through 1.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49038",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-dynamic-links/vulnerability/wordpress-wp-dynamic-links-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-dynamic-links/vulnerability/wordpress-wp-dynamic-links-plugin-1-0-1-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Soflyy WP Dynamic Links allows Reflected XSS. This issue affects WP Dynamic Links: from n/a through 1.0.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49037",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/authentication-and-xmlrpc-log-writer/vulnerability/wordpress-authentication-and-xmlrpc-log-writer-plugin-1-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/authentication-and-xmlrpc-log-writer/vulnerability/wordpress-authentication-and-xmlrpc-log-writer-plugin-1-2-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Federico Rota Authentication and xmlrpc log writer allows Reflected XSS. This issue affects Authentication and xmlrpc log writer: from n/a through 1.2.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49036",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/premium-addons-for-kingcomposer/vulnerability/wordpress-premium-addons-for-kingcomposer-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/premium-addons-for-kingcomposer/vulnerability/wordpress-premium-addons-for-kingcomposer-plugin-1-1-1-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in octagonwebstudio Premium Addons for KingComposer allows PHP Local File Inclusion. This issue affects Premium Addons for KingComposer: from n/a through 1.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49033",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/profilegrid-user-profiles-groups-and-communities/vulnerability/wordpress-profilegrid-5-9-5-3-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/profilegrid-user-profiles-groups-and-communities/vulnerability/wordpress-profilegrid-5-9-5-3-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Metagauss ProfileGrid  allows Blind SQL Injection. This issue affects ProfileGrid : from n/a through 5.9.5.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48332",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/advanced-gutenberg/vulnerability/wordpress-gutenberg-blocks-3-3-1-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/advanced-gutenberg/vulnerability/wordpress-gutenberg-blocks-3-3-1-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in PublishPress Gutenberg Blocks allows PHP Local File Inclusion. This issue affects Gutenberg Blocks: from n/a through 3.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48293",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/geo-mashup/vulnerability/wordpress-geo-mashup-plugin-1-13-16-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/geo-mashup/vulnerability/wordpress-geo-mashup-plugin-1-13-16-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in Dylan Kuhn  Geo Mashup allows PHP Local File Inclusion. This issue affects  Geo Mashup: from n/a through 1.13.16."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47689",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/video-blogster-lite/vulnerability/wordpress-video-blogster-lite-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/video-blogster-lite/vulnerability/wordpress-video-blogster-lite-plugin-1-2-reflected-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in johnh10 Video Blogster Lite allows Reflected XSS. This issue affects Video Blogster Lite: from n/a through 1.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47610",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/woocommerce-fortnox-integration/vulnerability/wordpress-woocommerce-fortnox-integration-4-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/woocommerce-fortnox-integration/vulnerability/wordpress-woocommerce-fortnox-integration-4-5-5-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Wetail WooCommerce Fortnox Integration allows Stored XSS. This issue affects WooCommerce Fortnox Integration: from n/a through 4.5.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47536",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/content-egg/vulnerability/wordpress-content-egg-7-0-0-php-object-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/content-egg/vulnerability/wordpress-content-egg-7-0-0-php-object-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of Untrusted Data vulnerability in keywordrush Content Egg allows Object Injection. This issue affects Content Egg: from n/a through 7.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3703",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/css-javascript-toolbox/vulnerability/wordpress-css-javascript-toolbox-12-0-3-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/css-javascript-toolbox/vulnerability/wordpress-css-javascript-toolbox-12-0-3-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in wipeoutmedia CSS & JavaScript Toolbox allows PHP Local File Inclusion. This issue affects CSS & JavaScript Toolbox: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-39510",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-pinterest-automatic/vulnerability/wordpress-pinterest-automatic-pin-plugin-4-19-0-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-pinterest-automatic/vulnerability/wordpress-pinterest-automatic-pin-plugin-4-19-0-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ValvePress Pinterest Automatic Pin allows SQL Injection. This issue affects Pinterest Automatic Pin: from n/a through n/a."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-39483",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/eventer/vulnerability/wordpress-eventer-plugin-3-9-6-shortcode-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/eventer/vulnerability/wordpress-eventer-plugin-3-9-6-shortcode-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Generation of Code ('Code Injection') vulnerability in imithemes Eventer allows Code Injection. This issue affects Eventer: from n/a through 3.9.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32288",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/rt18-extensions/vulnerability/wordpress-rt-theme-18-extensions-plugin-2-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/rt18-extensions/vulnerability/wordpress-rt-theme-18-extensions-plugin-2-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in stmcan RT-Theme 18 | Extensions allows PHP Local File Inclusion. This issue affects RT-Theme 18 | Extensions: from n/a through 2.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31425",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/leadcapture/vulnerability/wordpress-wp-lead-capturing-pages-plugin-2-3-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/leadcapture/vulnerability/wordpress-wp-lead-capturing-pages-plugin-2-3-arbitrary-content-deletion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in kamleshyadav WP Lead Capturing Pages allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WP Lead Capturing Pages: from n/a through 2.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31007",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/billplz-for-contact-form-7/vulnerability/wordpress-billplz-addon-for-contact-form-7-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/billplz-for-contact-form-7/vulnerability/wordpress-billplz-addon-for-contact-form-7-plugin-1-2-0-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Alvind Billplz Addon for Contact Form 7 allows Reflected XSS. This issue affects Billplz Addon for Contact Form 7: from n/a through 1.2.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30998",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-links-page/vulnerability/wordpress-wp-links-page-4-9-6-sql-injection-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-links-page/vulnerability/wordpress-wp-links-page-4-9-6-sql-injection-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Rico Macchi WP Links Page allows SQL Injection. This issue affects WP Links Page: from n/a through 4.9.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30993",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/woo-thank-you-page-customizer/vulnerability/wordpress-thank-you-page-customizer-for-woocommerce-increase-your-sales-1-1-7-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/woo-thank-you-page-customizer/vulnerability/wordpress-thank-you-page-customizer-for-woocommerce-increase-your-sales-1-1-7-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in VillaTheme Thank You Page Customizer for WooCommerce – Increase Your Sales allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Thank You Page Customizer for WooCommerce – Increase Your Sales: from n/a through 1.1.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30639",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/idonate-pro/vulnerability/wordpress-idonatepro-plugin-2-1-9-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/idonate-pro/vulnerability/wordpress-idonatepro-plugin-2-1-9-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in ThemeAtelier IDonatePro allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects IDonatePro: from n/a through 2.1.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30635",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/idonate-pro/vulnerability/wordpress-idonatepro-2-1-8-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/idonate-pro/vulnerability/wordpress-idonatepro-2-1-8-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThemeAtelier IDonatePro allows PHP Local File Inclusion. This issue affects IDonatePro: from n/a through 2.1.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30626",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/lbg_vp_youtube_vimeo_addon_visual_composer/vulnerability/wordpress-multimedia-playlist-slider-addon-for-wpbakery-page-builder-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/lbg_vp_youtube_vimeo_addon_visual_composer/vulnerability/wordpress-multimedia-playlist-slider-addon-for-wpbakery-page-builder-2-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in LambertGroup Multimedia Playlist Slider Addon for WPBakery Page Builder allows Reflected XSS. This issue affects Multimedia Playlist Slider Addon for WPBakery Page Builder: from n/a through 2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-29014",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/dzs-restaurantmenu/vulnerability/wordpress-foodmenu-1-20-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/dzs-restaurantmenu/vulnerability/wordpress-foodmenu-1-20-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZoomIt FoodMenu allows Reflected XSS. This issue affects FoodMenu: from n/a through 1.20."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28999",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/dzs-wootable/vulnerability/wordpress-woocommerce-shop-page-builder-2-27-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/dzs-wootable/vulnerability/wordpress-woocommerce-shop-page-builder-2-27-7-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in ZoomIt WooCommerce Shop Page Builder allows Reflected XSS. This issue affects WooCommerce Shop Page Builder: from n/a through 2.27.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28987",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/pressforward/vulnerability/wordpress-pressforward-5-8-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/pressforward/vulnerability/wordpress-pressforward-5-8-0-server-side-request-forgery-ssrf-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-Side Request Forgery (SSRF) vulnerability in PressForward PressForward allows Server Side Request Forgery. This issue affects PressForward: from n/a through 5.9.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28979",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-1-4-3-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-pipes/vulnerability/wordpress-wp-pipes-1-4-3-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in ThimPress WP Pipes allows PHP Local File Inclusion. This issue affects WP Pipes: from n/a through 1.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28975",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/alike/vulnerability/wordpress-alike-wordpress-custom-post-comparison-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/alike/vulnerability/wordpress-alike-wordpress-custom-post-comparison-3-0-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in redqteam Alike - WordPress Custom Post Comparison allows Reflected XSS. This issue affects Alike - WordPress Custom Post Comparison: from n/a through 3.0.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-28962",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/advanced-google-universal-analytics/vulnerability/wordpress-advanced-google-universal-analytics-plugin-1-0-3-broken-access-control-to-sensitive-data-exposure-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/advanced-google-universal-analytics/vulnerability/wordpress-advanced-google-universal-analytics-plugin-1-0-3-broken-access-control-to-sensitive-data-exposure-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in stefanoai Advanced Google Universal Analytics allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Advanced Google Universal Analytics: from n/a through 1.0.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25174",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/beeteam368-extensions/vulnerability/wordpress-beeteam368-extensions-plugin-1-9-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/beeteam368-extensions/vulnerability/wordpress-beeteam368-extensions-plugin-1-9-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 BeeTeam368 Extensions allows PHP Local File Inclusion. This issue affects BeeTeam368 Extensions: from n/a through 1.9.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25172",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/vidmov/vulnerability/wordpress-vidmov-1-9-4-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/vidmov/vulnerability/wordpress-vidmov-1-9-4-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in beeteam368 VidMov allows PHP Local File Inclusion. This issue affects VidMov: from n/a through 1.9.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24775",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/forms-by-made-it/vulnerability/wordpress-forms-2-9-0-arbitrary-file-upload-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/forms-by-made-it/vulnerability/wordpress-forms-2-9-0-arbitrary-file-upload-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type vulnerability in Made I.T. Forms allows Upload a Web Shell to a Web Server. This issue affects Forms: from n/a through 2.9.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24766",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/theme/news-magazine-x/vulnerability/wordpress-news-magazine-x-1-2-35-local-file-inclusion-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/theme/news-magazine-x/vulnerability/wordpress-news-magazine-x-1-2-35-local-file-inclusion-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') vulnerability in WP Royal Themes News Magazine X allows PHP Local File Inclusion. This issue affects News Magazine X: from n/a through 1.2.37."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T11:15Z",
    "lastModifiedDate" : "2025-08-14T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8956",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LonTan0/CVE/blob/main/Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi%20of%20D-Link%20DIR%E2%80%91818L.md",
          "name" : "https://github.com/LonTan0/CVE/blob/main/Remote%20Arbitrary%20Command%20Execution%20Vulnerability%20in%20ssdpcgi%20of%20D-Link%20DIR%E2%80%91818L.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319925",
          "name" : "VDB-319925 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319925",
          "name" : "VDB-319925 | D-Link DIR-818L ssdpcgi cgibin getenv command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627835",
          "name" : "Submit #627835 | Dlink D-Link DIR-818L Firmware versions = v1.05B01 Remote Arbitrary Command Execution",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in D-Link DIR-818L up to 1.05B01. This issue affects the function getenv of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-818l_firmware:105b01:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-818l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-18T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8955",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LitBot123/mycve/issues/3",
          "name" : "https://github.com/LitBot123/mycve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319924",
          "name" : "VDB-319924 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319924",
          "name" : "VDB-319924 | PHPGurukul Hospital Management System edit-doctor.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627832",
          "name" : "Submit #627832 | PHPGurukul Hospital Management System V4.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/LitBot123/mycve/issues/3",
          "name" : "https://github.com/LitBot123/mycve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Hospital Management System 4.0. This vulnerability affects unknown code of the file /admin/edit-doctor.php. The manipulation of the argument docfees leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:hospital_management_system:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-14T17:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8943",
        "ASSIGNER" : "security@jfrog.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://research.jfrog.com/vulnerabilities/flowise-os-command-remote-code-execution-jfsa-2025-001380578/",
          "name" : "https://research.jfrog.com/vulnerabilities/flowise-os-command-remote-code-execution-jfsa-2025-001380578/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Custom MCPs feature is designed to execute OS commands, for instance, using tools like `npx` to spin up local MCP Servers. However, Flowise's inherent authentication and authorization model is minimal and lacks role-based access controls (RBAC). Furthermore, in Flowise versions before 3.0.1 the default installation operates without authentication unless explicitly configured. This combination allows unauthenticated network attackers to execute unsandboxed OS commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-18T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8047",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/a0c70b98-a3f9-4d4c-a25f-81424230b1a5/",
          "name" : "https://wpscan.com/vulnerability/a0c70b98-a3f9-4d4c-a25f-81424230b1a5/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/a0c70b98-a3f9-4d4c-a25f-81424230b1a5/",
          "name" : "https://wpscan.com/vulnerability/a0c70b98-a3f9-4d4c-a25f-81424230b1a5/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The disable-right-click-powered-by-pixterme through v1.2 and pixter-image-digital-license thtough v1.0 WordPress plugins load a JavaScript file which has been compromised from an apparent abandoned S3 bucket. It can be used as a backdoor by those who control it, but it currently displays an alert marketing security services. Users that pay are added to allowedDomains to suppress the popup."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7761",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/posts/2025/07/CVE-2025-7761",
          "name" : "https://cert.pl/posts/2025/07/CVE-2025-7761",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.lepszybip.pl/",
          "name" : "https://www.lepszybip.pl/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.lepszybip.pl/",
          "name" : "https://www.lepszybip.pl/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Lepszy BIP is vulnerable to Reflected Cross-Site Scripting (XSS). Improper input validation in index.php form in one of the parameters allows arbitrary JavaScript to be executed on victim's browser when specially crafted URL is opened.\n\nThe vendor was contacted early about this disclosure but did not respond in any way. Potentially all versions are vulnerable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55346",
        "ASSIGNER" : "security@jfrog.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/",
          "name" : "https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/",
          "name" : "https://research.jfrog.com/vulnerabilities/flowise-js-injection-remote-code-exection-jfsa-2025-001379925/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "User-controlled input flows to an unsafe implementation of a dynamic Function constructor, allowing network attackers to run arbitrary unsandboxed JS code in the context of the host, by sending a simple POST request."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T10:15Z",
    "lastModifiedDate" : "2025-08-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8954",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LitBot123/mycve/issues/2",
          "name" : "https://github.com/LitBot123/mycve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319923",
          "name" : "VDB-319923 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319923",
          "name" : "VDB-319923 | PHPGurukul Hospital Management System doctor-specilization.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627831",
          "name" : "Submit #627831 | PHPGurukul Hospital Management System V4.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/LitBot123/mycve/issues/2",
          "name" : "https://github.com/LitBot123/mycve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in PHPGurukul Hospital Management System 4.0. This affects an unknown part of the file /admin/doctor-specilization.php. The manipulation of the argument doctorspecilization leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:hospital_management_system:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-14T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8953",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzb1388/cve/issues/29",
          "name" : "https://github.com/zzb1388/cve/issues/29",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319922",
          "name" : "VDB-319922 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319922",
          "name" : "VDB-319922 | SourceCodester COVID 19 Testing Management System check_availability.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627830",
          "name" : "Submit #627830 | SourceCodester COVID 19 Testing Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/zzb1388/cve/issues/29",
          "name" : "https://github.com/zzb1388/cve/issues/29",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in SourceCodester COVID 19 Testing Management System 1.0. Affected by this issue is some unknown functionality of the file /check_availability.php. The manipulation of the argument employeeid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-18T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8952",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.319921",
          "name" : "VDB-319921 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319921",
          "name" : "VDB-319921 | Campcodes Online Flight Booking Management System Login ajax.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627814",
          "name" : "Submit #627814 | Campcodes Online Flight Booking Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/mlyefhpcsdan2df3#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/mlyefhpcsdan2df3#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/mlyefhpcsdan2df3?singleDoc",
          "name" : "https://www.yuque.com/yuqueyonghuvrsrwv/dhlxlu/mlyefhpcsdan2df3?singleDoc",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Campcodes Online Flight Booking Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login of the component Login. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:online_flight_booking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-14T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5998",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/17bad181-6cea-445e-b91c-22415d90743e/",
          "name" : "https://wpscan.com/vulnerability/17bad181-6cea-445e-b91c-22415d90743e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/17bad181-6cea-445e-b91c-22415d90743e/",
          "name" : "https://wpscan.com/vulnerability/17bad181-6cea-445e-b91c-22415d90743e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PPWP – Password Protect Pages WordPress plugin before version 1.9.11 allows to put the site content behind a password authorization, however users with subscriber or greater roles can view content via the REST API."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:passwordprotectwp:password_protect_wordpress:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.9.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-18T20:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54472",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/r3xsy3wvs4kmfhc281173k5b6ll1xt2m",
          "name" : "https://lists.apache.org/thread/r3xsy3wvs4kmfhc281173k5b6ll1xt2m",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unlimited memory allocation in redis protocol parser in Apache bRPC (all versions < 1.14.1) on all platforms allows attackers to crash the service via network.\n\n\n\nRoot Cause: In the bRPC Redis protocol parser code, memory for arrays or strings of corresponding sizes is allocated based on the integers read from the network. If the integer read from the network is too large, it may cause a bad alloc error and lead to the program crashing. Attackers can exploit this feature by sending special data packets to the bRPC service to carry out a denial-of-service attack on it.\nThe bRPC 1.14.0 version tried to fix this issue by limited the memory allocation size, however, the limitation checking code is not well implemented that may cause integer overflow and evade such limitation. So the 1.14.0 version is also vulnerable, although the integer range that affect version 1.14.0 is different from that affect version < 1.14.0.\n\n\n\nAffected scenarios: Using bRPC as a Redis server to provide network services to untrusted clients, or using bRPC as a Redis client to call untrusted Redis services.\n\n\n\nHow to Fix: we provide two methods, you can choose one of them:\n\n1. Upgrade bRPC to version 1.14.1.\n2. Apply this patch ( https://github.com/apache/brpc/pull/3050 ) manually.\n\nNo matter you choose which method, you should note that the patch limits the maximum length of memory allocated for each time in the bRPC Redis parser. The default limit is 64M. If some of you redis request or response have a size larger than 64M, you might encounter error after upgrade. For such case, you can modify the gflag redis_max_allocation_size to set a larger limit."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:brpc:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.14.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-18T18:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48862",
        "ASSIGNER" : "psirt@bosch.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "name" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ambiguous wording in the web interface of the ctrlX OS setup mechanism could lead the user to believe that the backup file is encrypted when a password is set. However, only the private key - if available in the backup - is encrypted, while the backup file itself remains unencrypted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-14T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48861",
        "ASSIGNER" : "psirt@bosch.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "name" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Task API endpoint of the ctrlX OS setup mechanism allowed a remote, unauthenticated attacker to access and extract internal application data, including potential debug logs and the version of installed apps."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-14T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48860",
        "ASSIGNER" : "psirt@bosch.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "name" : "https://psirt.bosch.com/security-advisories/BOSCH-SA-129652.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web application of the ctrlX OS setup mechanism facilitated an authenticated (low privileged) attacker to gain remote access to backup archives created by a user with elevated permissions. Depending on the content of the backup archive, the attacker may have been able to access sensitive data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T09:15Z",
    "lastModifiedDate" : "2025-08-14T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8951",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zzx-yyds/mycve/issues/1",
          "name" : "https://github.com/zzx-yyds/mycve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319920",
          "name" : "VDB-319920 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319920",
          "name" : "VDB-319920 | PHPGurukul Teachers Record Management System search.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627738",
          "name" : "Submit #627738 | phpgurukul Teachers Record Management System V2.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Teachers Record Management System 2.1. Affected is an unknown function of the file /admin/search.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:teachers_record_management_system:2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T08:15Z",
    "lastModifiedDate" : "2025-08-14T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8950",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Noc14/cve/issues/1",
          "name" : "https://github.com/Noc14/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319919",
          "name" : "VDB-319919 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319919",
          "name" : "VDB-319919 | Campcodes Online Recruitment Management System index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627710",
          "name" : "Submit #627710 | Campcodes Online Recruitment Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Campcodes Online Recruitment Management System 1.0. This issue affects some unknown processing of the file /Recruitment/index.php?page=view_vacancy. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:online_recruitment_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T08:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27388",
        "ASSIGNER" : "security@oppo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1955879800426209280",
          "name" : "https://security.oppo.com/en/noticeDetail?notice_only_key=NOTICE-1955879800426209280",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Loading arbitrary external URLs through WebView components introduces malicious JS code that can steal arbitrary user tokens."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T08:15Z",
    "lastModifiedDate" : "2025-08-14T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8949",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/i-Corner/cve/issues/16",
          "name" : "https://github.com/i-Corner/cve/issues/16",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319915",
          "name" : "VDB-319915 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319915",
          "name" : "VDB-319915 | D-Link DIR-825 httpd ping_response.cgi get_ping_app_stat stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627640",
          "name" : "Submit #627640 | D-Link DIR-825 R Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in D-Link DIR-825 2.10. Affected by this vulnerability is the function get_ping_app_stat of the file ping_response.cgi of the component httpd. The manipulation of the argument ping_ipaddr leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-825_firmware:2.10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T07:15Z",
    "lastModifiedDate" : "2025-08-18T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8948",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/5",
          "name" : "https://github.com/guoma-book/CVE/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319914",
          "name" : "VDB-319914 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319914",
          "name" : "VDB-319914 | projectworlds Visitor Management System front.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.632003",
          "name" : "Submit #632003 | Projectworlds Visitor Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in projectworlds Visitor Management System 1.0. Affected is an unknown function of the file /front.php. The manipulation of the argument rid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:visitor_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T07:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8947",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/3",
          "name" : "https://github.com/guoma-book/CVE/issues/3",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/guoma-book/CVE/issues/4",
          "name" : "https://github.com/guoma-book/CVE/issues/4",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319913",
          "name" : "VDB-319913 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319913",
          "name" : "VDB-319913 | projectworlds Visitor Management System query_data.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631995",
          "name" : "Submit #631995 | Projectworlds Visitor Management System Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631996",
          "name" : "Submit #631996 | Projectworlds  Visitor Management System Project V1.0 SQL injection (Duplicate)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in projectworlds Visitor Management System 1.0. This issue affects some unknown processing of the file /query_data.php. The manipulation of the argument dateF/dateP leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:visitor_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T07:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8946",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoma-book/CVE/issues/1",
          "name" : "https://github.com/guoma-book/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319912",
          "name" : "VDB-319912 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319912",
          "name" : "VDB-319912 | projectworlds Online Notes Sharing Platform login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631982",
          "name" : "Submit #631982 | Projectworlds Online Notes Sharing Platform Project V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in projectworlds Online Notes Sharing Platform 1.0. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument User leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:online_notes_sharing_platform:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8940",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md#poc",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md#poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319903",
          "name" : "VDB-319903 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319903",
          "name" : "VDB-319903 | Tenda AC20 saveParentControlInfo strcpy buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631836",
          "name" : "Submit #631836 | Tenda AC20 = V16.03.08.12 (latest version) Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20-2/Tenda%20AC20-2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Tenda AC20 up to 16.03.08.12. Affected by this vulnerability is the function strcpy of the file /goform/saveParentControlInfo. The manipulation of the argument Time leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "16.03.08.0",
            "versionEndIncluding" : "16.03.08.12",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-19T18:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8939",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md#3-poc",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md#3-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319902",
          "name" : "VDB-319902 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319902",
          "name" : "VDB-319902 | Tenda AC20 WifiGuestSet buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631829",
          "name" : "Submit #631829 | Tenda AC20 = V16.03.08.12 (latest version) Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md",
          "name" : "https://github.com/lin-3-start/lin-cve/blob/main/Tenda%20AC20/Tenda%20AC20.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Tenda AC20 up to 16.03.08.12. Affected is an unknown function of the file /goform/WifiGuestSet. The manipulation of the argument shareSpeed leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac20_firmware:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "16.03.08.0",
            "versionEndIncluding" : "16.03.08.12",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-19T18:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8046",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/",
          "name" : "https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/",
          "name" : "https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Injection Guard WordPress plugin before 1.2.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7808",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/fa199423-6526-47f6-bab5-9f6dff0f236a/",
          "name" : "https://wpscan.com/vulnerability/fa199423-6526-47f6-bab5-9f6dff0f236a/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Shopify WordPress plugin before 1.5.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6790",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/af337f9f-c955-49eb-9675-2f85da96fcfe/",
          "name" : "https://wpscan.com/vulnerability/af337f9f-c955-49eb-9675-2f85da96fcfe/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/af337f9f-c955-49eb-9675-2f85da96fcfe/",
          "name" : "https://wpscan.com/vulnerability/af337f9f-c955-49eb-9675-2f85da96fcfe/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Quiz and Survey Master (QSM)  WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3414",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/1dd322b5-3c1d-4da7-8737-e6688fc9f4df/",
          "name" : "https://wpscan.com/vulnerability/1dd322b5-3c1d-4da7-8737-e6688fc9f4df/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/1dd322b5-3c1d-4da7-8737-e6688fc9f4df/",
          "name" : "https://wpscan.com/vulnerability/1dd322b5-3c1d-4da7-8737-e6688fc9f4df/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Structured Content (JSON-LD) #wpsc WordPress plugin before 1.7.0 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T06:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8938",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-912"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysTel/formSysTel.md",
          "name" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysTel/formSysTel.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysTel/formSysTel.md#poc",
          "name" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysTel/formSysTel.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319901",
          "name" : "VDB-319901 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319901",
          "name" : "VDB-319901 | TOTOLINK N350R Telnet Service formSysTel backdoor",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631837",
          "name" : "Submit #631837 | TOOLINK N350R V1.2.3-B20130826 Backdoor",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TOTOLINK N350R 1.2.3-B20130826. This issue affects the function formSysTel of the file /boafrm/formSysTel of the component Telnet Service. The manipulation of the argument TelEnabled leads to backdoor. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8937",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysCmd/formSysCmd.md",
          "name" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/formSysCmd/formSysCmd.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/N350R_formSysCmd.pdf",
          "name" : "https://github.com/rew1X/CVE/blob/main/TOTOLINK/N350R_formSysCmd.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319900",
          "name" : "VDB-319900 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319900",
          "name" : "VDB-319900 | TOTOLINK N350R formSysCmd command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631826",
          "name" : "Submit #631826 | TOTOLINK N350R V1.2.3-B20130826 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631838",
          "name" : "Submit #631838 | TOTOLINK N350R V1.2.3-B20130826 Command Injection (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in TOTOLINK N350R 1.2.3-B20130826. This vulnerability affects unknown code of the file /boafrm/formSysCmd. The manipulation leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8936",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/7",
          "name" : "https://github.com/lan041221/cvec/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/7",
          "name" : "https://github.com/lan041221/cvec/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319898",
          "name" : "VDB-319898 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319898",
          "name" : "VDB-319898 | 1000 Projects Sales Management System dordupdate.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631748",
          "name" : "Submit #631748 | 1000 Projects  sales management system for hypermarkets v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in 1000 Projects Sales Management System 1.0. Affected by this issue is some unknown functionality of the file /superstore/dist/dordupdate.php. The manipulation of the argument select2 leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5942",
        "ASSIGNER" : "psirt@netskope.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-003",
          "name" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-003",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Netskope was notified about a potential gap in its agent (NS Client) on Windows systems.  If this gap is successfully exploited, an unprivileged user can trigger a heap overflow in the epdlpdrv.sys driver, leading to a Blue-Screen-of-Death (BSOD). Successful exploitation can also potentially be performed by an unprivileged user whose NS Client is configured to use Endpoint DLP. A successful exploit can result in a denial-of-service for the local machine."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5941",
        "ASSIGNER" : "psirt@netskope.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-001",
          "name" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Netskope is notified about a potential gap in its agent (NS Client) in which a malicious actor could trigger a memory leak by sending a crafted DNS packet to a machine. A successful exploitation may require administrative privileges on the machine, based on the exact configuration. A successful exploit can potentially result in user-controllable memory being leaked in a domain name stored on the local machine."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0309",
        "ASSIGNER" : "psirt@netskope.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.amberwolf.com/blog/2025/august/breaking-into-your-network-zer0-effort/",
          "name" : "https://blog.amberwolf.com/blog/2025/august/breaking-into-your-network-zer0-effort/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-002",
          "name" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-002",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An insufficient validation on the server connection endpoint in Netskope Client allows local users to elevate privileges on the system. The insufficient validation allows Netskope Client to connect to any other server with Public Signed CA TLS certificates and send specially crafted responses to elevate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-7402",
        "ASSIGNER" : "psirt@netskope.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2024-002",
          "name" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2024-002",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Netskope has identified a potential gap in its agent (Netskope Client) in which a malicious insider can potentially tamper the Netskope Client configuration by performing MITM (Man-in-the-Middle) activity on the Netskope Client communication channel. A successful exploitation would require administrative privileges on the machine, and could result in temporarily altering the configuration of Netskope Client or permanently disabling or removing the agent from the machine."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8935",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/6",
          "name" : "https://github.com/lan041221/cvec/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/6",
          "name" : "https://github.com/lan041221/cvec/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319897",
          "name" : "VDB-319897 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319897",
          "name" : "VDB-319897 | 1000 Projects Sales Management System custcmp.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631729",
          "name" : "Submit #631729 | 1000 Projects  sales management system for hypermarkets v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in 1000 Projects Sales Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /superstore/custcmp.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T04:16Z",
    "lastModifiedDate" : "2025-08-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8934",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/5",
          "name" : "https://github.com/lan041221/cvec/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/5",
          "name" : "https://github.com/lan041221/cvec/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319896",
          "name" : "VDB-319896 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319896",
          "name" : "VDB-319896 | 1000 Projects Sales Management System sales.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631727",
          "name" : "Submit #631727 | 1000 Projects  sales management system for hypermarkets v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in 1000 Projects Sales Management System 1.0. Affected is an unknown function of the file /sales.php. The manipulation of the argument select2112 leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T04:16Z",
    "lastModifiedDate" : "2025-08-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8933",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/4",
          "name" : "https://github.com/lan041221/cvec/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/4",
          "name" : "https://github.com/lan041221/cvec/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319895",
          "name" : "VDB-319895 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319895",
          "name" : "VDB-319895 | 1000 Projects Sales Management System sales.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631708",
          "name" : "Submit #631708 | 1000 Projects  sales management system for hypermarkets v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in 1000 Projects Sales Management System 1.0. This issue affects some unknown processing of the file /superstore/admin/sales.php. The manipulation of the argument ssalescat leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-14T04:15Z",
    "lastModifiedDate" : "2025-08-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8932",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lan041221/cvec/issues/3",
          "name" : "https://github.com/lan041221/cvec/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319894",
          "name" : "VDB-319894 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.319894",
          "name" : "VDB-319894 | 1000 Projects Sales Management System sales.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?submit.631703",
          "name" : "Submit #631703 | 1000 Projects  sales management system for hypermarkets v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/lan041221/cvec/issues/3",
          "name" : "https://github.com/lan041221/cvec/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.631703",
          "name" : "https://vuldb.com/?submit.631703",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in 1000 Projects Sales Management System 1.0. This vulnerability affects unknown code of the file /superstore/admin/sales.php. The manipulation of the argument ssalescat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:sales_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T03:15Z",
    "lastModifiedDate" : "2025-08-15T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8931",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319890",
          "name" : "VDB-319890 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319890",
          "name" : "VDB-319890 | code-projects Medical Store Management System ChangePassword.java sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631664",
          "name" : "Submit #631664 | code-projects Medical Store Management System 1 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/tdgsgs7k1wrhc20v#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/tdgsgs7k1wrhc20v#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/tdgsgs7k1wrhc20v?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/tdgsgs7k1wrhc20v?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in code-projects Medical Store Management System 1.0. Affected is an unknown function of the file ChangePassword.java. The manipulation of the argument newPassTxt leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:medical_store_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T03:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8930",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319889",
          "name" : "VDB-319889 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319889",
          "name" : "VDB-319889 | code-projects Medical Store Management System Update Company UpdateCompany.java sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631663",
          "name" : "Submit #631663 | code-projects Medical Store Management System 1 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/uv3gmxc8tpmbg4vw#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/uv3gmxc8tpmbg4vw#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/uv3gmxc8tpmbg4vw?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/uv3gmxc8tpmbg4vw?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Medical Store Management System 1.0. This issue affects some unknown processing of the file UpdateCompany.java of the component Update Company Page. The manipulation of the argument companyNameTxt leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:medical_store_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-14T03:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55199",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/helm/helm/commit/b78692c18f0fb38fe5ba4571a674de067a4c53a5",
          "name" : "https://github.com/helm/helm/commit/b78692c18f0fb38fe5ba4571a674de067a4c53a5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/helm/helm/security/advisories/GHSA-9h84-qmv7-982p",
          "name" : "https://github.com/helm/helm/security/advisories/GHSA-9h84-qmv7-982p",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, it is possible to craft a JSON Schema file in a manner which could cause Helm to use all available memory and have an out of memory (OOM) termination. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring all Helm charts that are being loaded into Helm do not have any reference of $ref pointing to /dev/zero."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T00:15Z",
    "lastModifiedDate" : "2025-08-14T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55198",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6",
          "name" : "https://github.com/helm/helm/commit/ec5f59e2db56533d042a124f5bae54dd87b558e6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68",
          "name" : "https://github.com/helm/helm/security/advisories/GHSA-f9f8-9pmf-xv68",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Helm is a package manager for Charts for Kubernetes. Prior to version 3.18.5, when parsing Chart.yaml and index.yaml files, an improper validation of type error can lead to a panic. This issue has been resolved in Helm 3.18.5. A workaround involves ensuring YAML files are formatted as Helm expects prior to processing them with Helm."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T00:15Z",
    "lastModifiedDate" : "2025-08-14T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55197",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          }, {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143",
          "name" : "https://github.com/py-pdf/pypdf/blob/0dd57738bbdcdb63f0fb43d8a6b3d222b6946595/pypdf/filters.py#L72-L143",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/py-pdf/pypdf/issues/3429",
          "name" : "https://github.com/py-pdf/pypdf/issues/3429",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/py-pdf/pypdf/pull/3430",
          "name" : "https://github.com/py-pdf/pypdf/pull/3430",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/py-pdf/pypdf/releases/tag/6.0.0",
          "name" : "https://github.com/py-pdf/pypdf/releases/tag/6.0.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m",
          "name" : "https://github.com/py-pdf/pypdf/security/advisories/GHSA-7hfw-26vp-jp8m",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Mitigation" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "pypdf is a free and open-source pure-python PDF library. Prior to version 6.0.0, an attacker can craft a PDF which leads to the RAM being exhausted. This requires just reading the file if a series of FlateDecode filters is used on a malicious cross-reference stream. Other content streams are affected on explicit access. This issue has been fixed in 6.0.0. If an update is not possible, a workaround involves including the fixed code from pypdf.filters.decompress into the existing filters file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pypdf_project:pypdf:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T23:15Z",
    "lastModifiedDate" : "2025-08-15T20:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55196",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/external-secrets/external-secrets/commit/39cdba5863533007b582dc63dd300839326b2f1d",
          "name" : "https://github.com/external-secrets/external-secrets/commit/39cdba5863533007b582dc63dd300839326b2f1d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/external-secrets/external-secrets/commit/de40e8f4fa9559c1d770bb674589b285da5ef2d1",
          "name" : "https://github.com/external-secrets/external-secrets/commit/de40e8f4fa9559c1d770bb674589b285da5ef2d1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/external-secrets/external-secrets/pull/5109",
          "name" : "https://github.com/external-secrets/external-secrets/pull/5109",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/external-secrets/external-secrets/pull/5133",
          "name" : "https://github.com/external-secrets/external-secrets/pull/5133",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/external-secrets/external-secrets/security/advisories/GHSA-fcxq-v2r3-cc8h",
          "name" : "https://github.com/external-secrets/external-secrets/security/advisories/GHSA-fcxq-v2r3-cc8h",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "External Secrets Operator is a Kubernetes operator that integrates external secret management systems. From version 0.15.0 to before 0.19.2, a vulnerability was discovered where the List() calls for Kubernetes Secret and SecretStore resources performed by the PushSecret controller did not apply a namespace selector. This flaw allowed an attacker to use label selectors to list and read secrets/secret-stores across the cluster, bypassing intended namespace restrictions. An attacker with the ability to create or update PushSecret resources and control SecretStore configurations could exploit this vulnerability to exfiltrate sensitive data from arbitrary namespaces. This could lead to full disclosure of Kubernetes secrets, including credentials, tokens, and other sensitive information stored in the cluster. This vulnerability has been patched in version 0.19.2. A workaround for this issue includes auditing and restricting RBAC permissions so that only trusted service accounts can create or update PushSecret and SecretStore resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T23:15Z",
    "lastModifiedDate" : "2025-08-13T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55194",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/10exp_BS9kRKHrFSPjiA_ZYUVJbHN8doW/view",
          "name" : "https://drive.google.com/file/d/10exp_BS9kRKHrFSPjiA_ZYUVJbHN8doW/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/10exp_BS9kRKHrFSPjiA_ZYUVJbHN8doW/view",
          "name" : "https://drive.google.com/file/d/10exp_BS9kRKHrFSPjiA_ZYUVJbHN8doW/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Part-DB/Part-DB-server/commit/d370f976a7b0c19d502aadbaa0f93eb90c2a6ffa",
          "name" : "https://github.com/Part-DB/Part-DB-server/commit/d370f976a7b0c19d502aadbaa0f93eb90c2a6ffa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww",
          "name" : "https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww",
          "name" : "https://github.com/Part-DB/Part-DB-server/security/advisories/GHSA-7rv3-rcxv-69ww",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Part-DB is an open source inventory management system for electronic components. Prior to version 1.17.3, any authenticated user can upload a profile picture with a misleading file extension (e.g., .jpg.txt), resulting in a persistent 500 Internal Server Error when attempting to view or edit that user’s profile. This makes the profile permanently inaccessible via the UI for both users and administrators, constituting a Denial of Service (DoS) within the user management interface. This issue has been patched in version 1.17.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T23:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55193",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-150"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/rails/rails/commit/3beef20013736fd52c5dcfdf061f7999ba318290",
          "name" : "https://github.com/rails/rails/commit/3beef20013736fd52c5dcfdf061f7999ba318290",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rails/rails/commit/568c0bc2f1e74c65d150a84b89a080949bf9eb9b",
          "name" : "https://github.com/rails/rails/commit/568c0bc2f1e74c65d150a84b89a080949bf9eb9b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rails/rails/commit/6a944ca4805e72050a0fbb1a461534eb760d3202",
          "name" : "https://github.com/rails/rails/commit/6a944ca4805e72050a0fbb1a461534eb760d3202",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rails/rails/security/advisories/GHSA-76r7-hhxj-r776",
          "name" : "https://github.com/rails/rails/security/advisories/GHSA-76r7-hhxj-r776",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Active Record connects classes to relational database tables. Prior to versions 7.1.5.2, 7.2.2.2, and 8.0.2.1, the ID passed to find or similar methods may be logged without escaping. If this is directly to the terminal it may include unescaped ANSI sequences. This issue has been patched in versions 7.1.5.2, 7.2.2.2, and 8.0.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T23:15Z",
    "lastModifiedDate" : "2025-08-13T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8929",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319888",
          "name" : "VDB-319888 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319888",
          "name" : "VDB-319888 | code-projects Medical Store Management System MainPanel.java sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631662",
          "name" : "Submit #631662 | code-projects Medical Store Management System 1 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/peapz0yqgga5b3q2#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/peapz0yqgga5b3q2#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/peapz0yqgga5b3q2?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/peapz0yqgga5b3q2?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Medical Store Management System 1.0. This vulnerability affects unknown code of the file MainPanel.java. The manipulation of the argument searchTxt leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:medical_store_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T22:15Z",
    "lastModifiedDate" : "2025-08-14T17:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8928",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319887",
          "name" : "VDB-319887 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319887",
          "name" : "VDB-319887 | code-projects Medical Store Management System Update Medicines UpdateMedicines.java sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631661",
          "name" : "Submit #631661 | code-projects Medical Store Management System 1 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ktz2n3ywyt85zct3#vulnerability-details-and-poc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ktz2n3ywyt85zct3#vulnerability-details-and-poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ktz2n3ywyt85zct3?singleDoc",
          "name" : "https://www.yuque.com/gongzi-jsnek/xb2q3a/ktz2n3ywyt85zct3?singleDoc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in code-projects Medical Store Management System 1.0. This affects an unknown part of the file UpdateMedicines.java of the component Update Medicines Page. The manipulation of the argument productNameTxt leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:medical_store_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T22:15Z",
    "lastModifiedDate" : "2025-08-14T17:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-34154",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/Janrdrz/3cf67a9ad488e07ceaacd7c1a7e59ae7",
          "name" : "https://gist.github.com/Janrdrz/3cf67a9ad488e07ceaacd7c1a7e59ae7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/Janrdrz/3cf67a9ad488e07ceaacd7c1a7e59ae7",
          "name" : "https://gist.github.com/Janrdrz/3cf67a9ad488e07ceaacd7c1a7e59ae7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://synergetic-data.com/",
          "name" : "https://synergetic-data.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://unform.com/download/uf101_readme.txt",
          "name" : "https://unform.com/download/uf101_readme.txt",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "UnForm Server Manager versions prior to 10.1.12 expose an unauthenticated file read vulnerability via its log file analysis interface. The flaw resides in the arc endpoint, which accepts a fl parameter to specify the log file to be opened. Due to insufficient input validation and lack of path sanitization, attackers can supply relative paths to access arbitrary files on the host system — including sensitive OS-level files — without authentication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10060",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.html",
          "name" : "https://advisories.checkpoint.com/defense/advisories/public/2012/cpai-23-sepc.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ssh/sysax_ssh_username.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.html",
          "name" : "https://web.archive.org/web/20120302203344/http://www.pwnag3.com/2012/02/sysax-multi-server-ssh-username-exploit.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18535",
          "name" : "https://www.exploit-db.com/exploits/18535",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18557",
          "name" : "https://www.exploit-db.com/exploits/18557",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sysax.com/",
          "name" : "https://www.sysax.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/sysax-multi-server-ssh-username-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sysax Multi Server versions prior to 5.55 contains a stack-based buffer overflow in its SSH service. When a remote attacker supplies an overly long username during authentication, the server copies the input to a fixed-size stack buffer without proper bounds checking. This allows remote code execution under the context of the service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10059",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dolibarr_cmd_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dolibarr_cmd_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dolibarr_cmd_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/dolibarr_cmd_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://seclists.org/fulldisclosure/2012/Apr/78",
          "name" : "https://seclists.org/fulldisclosure/2012/Apr/78",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://seclists.org/fulldisclosure/2012/Apr/78",
          "name" : "https://seclists.org/fulldisclosure/2012/Apr/78",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dolibarr.org/",
          "name" : "https://www.dolibarr.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18724",
          "name" : "https://www.exploit-db.com/exploits/18724",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18724",
          "name" : "https://www.exploit-db.com/exploits/18724",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18725",
          "name" : "https://www.exploit-db.com/exploits/18725",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18725",
          "name" : "https://www.exploit-db.com/exploits/18725",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/dolibarr-erp-crm-post-auth-os-command-injection",
          "name" : "https://www.vulncheck.com/advisories/dolibarr-erp-crm-post-auth-os-command-injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dolibarr ERP/CRM versions <= 3.1.1 and <= 3.2.0 contain a post-authenticated OS command injection vulnerability in its database backup feature. The export.php script fails to sanitize the sql_compat parameter, allowing authenticated users to inject arbitrary system commands, resulting in remote code execution on the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10058",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://aluigi.altervista.org/adv/r4_1-adv.txt",
          "name" : "http://aluigi.altervista.org/adv/r4_1-adv.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.html",
          "name" : "https://advisories.checkpoint.com/defense/advisories/public/2013/cpai-07-jan405.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/rabidhamster_r4_log.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18929",
          "name" : "https://www.exploit-db.com/exploits/18929",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.rabidhamster.org/R4/download.php",
          "name" : "https://www.rabidhamster.org/R4/download.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/rabidhamster-r4-log-entry-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "RabidHamster R4 v1.25 contains a stack-based buffer overflow vulnerability due to unsafe use of sprintf() when logging malformed HTTP requests. A remote attacker can exploit this flaw by sending a specially crafted URI, resulting in arbitrary code execution under the context of the web server process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10057",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/ispvm_xcf_ispxcf.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/ispvm_xcf_ispxcf.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/ispvm_xcf_ispxcf.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/ispvm_xcf_ispxcf.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20121014002756/http://secunia.com/advisories/48740/",
          "name" : "https://web.archive.org/web/20121014002756/http://secunia.com/advisories/48740/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18947",
          "name" : "https://www.exploit-db.com/exploits/18947",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18947",
          "name" : "https://www.exploit-db.com/exploits/18947",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.latticesemi.com/ispvm",
          "name" : "https://www.latticesemi.com/ispvm",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/lattice-semiconductor-ispvm-system-xcf-file-handling-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/lattice-semiconductor-ispvm-system-xcf-file-handling-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Lattice Semiconductor ispVM System v18.0.2 contains a buffer overflow vulnerability in its handling of .xcf project files. When parsing the version attribute of the ispXCF XML tag, the application fails to properly validate input length, allowing a specially crafted file to overwrite memory on the stack. This can result in arbitrary code execution under the context of the user who opens the file. The vulnerability is triggered locally by opening a malicious .xcf file and does not require elevated privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10056",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_volunteer_upload_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/php_volunteer_upload_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceforge.net/projects/phpvolunteer/",
          "name" : "https://sourceforge.net/projects/phpvolunteer/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18941",
          "name" : "https://www.exploit-db.com/exploits/18941",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18957",
          "name" : "https://www.exploit-db.com/exploits/18957",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/php-volunteer-management-system-arbitrary-file-upload",
          "name" : "https://www.vulncheck.com/advisories/php-volunteer-management-system-arbitrary-file-upload",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PHP Volunteer Management System v1.0.2 contains an arbitrary file upload vulnerability in its document upload functionality. Authenticated users can upload files to the mods/documents/uploads/ directory without any restriction on file type or extension. Because this directory is publicly accessible and lacks execution controls, attackers can upload a malicious PHP payload and execute it remotely. The application ships with default credentials, making exploitation trivial. Once authenticated, the attacker can upload a PHP shell and trigger it via a direct GET request."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10055",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120317214524/http://ftp.comsnd.com/",
          "name" : "https://web.archive.org/web/20120317214524/http://ftp.comsnd.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/19024",
          "name" : "https://www.exploit-db.com/exploits/19024",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/19177",
          "name" : "https://www.exploit-db.com/exploits/19177",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/comsndftp-user-format-string-rce",
          "name" : "https://www.vulncheck.com/advisories/comsndftp-user-format-string-rce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/comsnd_ftpd_fmtstr.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/19177",
          "name" : "https://www.exploit-db.com/exploits/19177",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/19024",
          "name" : "https://www.exploit-db.com/exploits/19024",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ComSndFTP FTP Server version 1.3.7 Beta contains a format string vulnerability in its handling of the USER command. By sending a specially crafted username containing format specifiers, a remote attacker can overwrite a hardcoded function pointer in memory (specifically WSACleanup from Ws2_32.dll). This allows the attacker to redirect execution flow and bypass DEP protections using a ROP chain, ultimately leading to arbitrary code execution. The vulnerability is exploitable without authentication and affects default configurations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2012-10054",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/umbraco/Umbraco-CMS",
          "name" : "https://github.com/umbraco/Umbraco-CMS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/umbraco_upload_aspx.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/http/umbraco_upload_aspx.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20111017174609/http://umbraco.codeplex.com/releases/view/73692",
          "name" : "https://web.archive.org/web/20111017174609/http://umbraco.codeplex.com/releases/view/73692",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120707033729/http://blog.gdssecurity.com/labs/2012/7/3/find-bugs-faster-with-a-webmatrix-local-reference-instance.html",
          "name" : "https://web.archive.org/web/20120707033729/http://blog.gdssecurity.com/labs/2012/7/3/find-bugs-faster-with-a-webmatrix-local-reference-instance.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120707033729/http://blog.gdssecurity.com/labs/2012/7/3/find-bugs-faster-with-a-webmatrix-local-reference-instance.html",
          "name" : "https://web.archive.org/web/20120707033729/http://blog.gdssecurity.com/labs/2012/7/3/find-bugs-faster-with-a-webmatrix-local-reference-instance.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/19671",
          "name" : "https://www.exploit-db.com/exploits/19671",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/umbraco-cms-rce",
          "name" : "https://www.vulncheck.com/advisories/umbraco-cms-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Umbraco CMS versions prior to 4.7.1 are vulnerable to unauthenticated remote code execution via the codeEditorSave.asmx SOAP endpoint, which exposes a SaveDLRScript operation that permits arbitrary file uploads without authentication. By exploiting a path traversal flaw in the fileName parameter, attackers can write malicious ASPX scripts directly into the web-accessible /umbraco/ directory and execute them remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10019",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/orgs/spree",
          "name" : "https://github.com/orgs/spree",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/spree_search_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group/",
          "name" : "https://web.archive.org/web/20111009192436/http://spreecommerce.com/blog/2011/10/05/remote-command-product-group/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17941",
          "name" : "https://www.exploit-db.com/exploits/17941",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce",
          "name" : "https://www.vulncheck.com/advisories/spreecommerce-search-parameter-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Spreecommerce versions prior to 0.60.2 contains a remote command execution vulnerability in its search functionality. The application fails to properly sanitize input passed via the search[send][] parameter, which is dynamically invoked using Ruby’s send method. This allows attackers to execute arbitrary shell commands on the server without authentication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-18T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10018",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.mybb.com/2011/10/06/1-6-4-security-vulnerabilit/",
          "name" : "https://blog.mybb.com/2011/10/06/1-6-4-security-vulnerabilit/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://web.archive.org/web/20111015224948/http://secunia.com/advisories/46300/",
          "name" : "https://web.archive.org/web/20111015224948/http://secunia.com/advisories/46300/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17949",
          "name" : "https://www.exploit-db.com/exploits/17949",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/mybb-backdoor-arbitrary-command-execution",
          "name" : "https://www.vulncheck.com/advisories/mybb-backdoor-arbitrary-command-execution",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17949",
          "name" : "https://www.exploit-db.com/exploits/17949",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/unix/webapp/mybb_backdoor.rb",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "myBB version 1.6.4 was distributed with an unauthorized backdoor embedded in the source code. The backdoor allowed remote attackers to execute arbitrary PHP code by injecting payloads into a specially crafted collapsed cookie. This vulnerability was introduced during packaging and was not part of the intended application logic. Exploitation requires no authentication and results in full compromise of the web server under the context of the web application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mybb:mybb:1.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T17:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10017",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/snortreport_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/snortreport_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20111003093911/http://www.symmetrixtech.com/articles/news-016.html",
          "name" : "https://web.archive.org/web/20111003093911/http://www.symmetrixtech.com/articles/news-016.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17947",
          "name" : "https://www.exploit-db.com/exploits/17947",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/snort-report-rce",
          "name" : "https://www.vulncheck.com/advisories/snort-report-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Snort Report versions < 1.3.2 contains a remote command execution vulnerability in the nmap.php and nbtscan.php scripts. These scripts fail to properly sanitize user input passed via the target GET parameter, allowing attackers to inject arbitrary shell commands. Exploitation requires no authentication and can result in full compromise of the underlying system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10016",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/real_networks_netzip_bof.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/16083",
          "name" : "https://www.exploit-db.com/exploits/16083",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17985",
          "name" : "https://www.exploit-db.com/exploits/17985",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.softpedia.com/get/Compression-tools/NetZip-Classic.shtml",
          "name" : "https://www.softpedia.com/get/Compression-tools/NetZip-Classic.shtml",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/real-networks-netzip-classic-file-parsing-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/real-networks-netzip-classic-file-parsing-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Real Networks Netzip Classic version 7.5.1.86 is vulnerable to a stack-based buffer overflow when parsing a specially crafted ZIP archive. The vulnerability is triggered when the application attempts to process a file name within the archive that exceeds the expected buffer size. Exploitation allows arbitrary code execution under the context of the victim user when the ZIP file is opened."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10015",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://aluigi.altervista.org/adv/cytel_1-adv.txt",
          "name" : "http://aluigi.altervista.org/adv/cytel_1-adv.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/cytel_studio_cy3.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110301000000*/http://www.cytel.com/Software/StatXact.aspx",
          "name" : "https://web.archive.org/web/20110301000000*/http://www.cytel.com/Software/StatXact.aspx",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110708215826/http://www.cytel.com/Software/LogXact.aspx",
          "name" : "https://web.archive.org/web/20110708215826/http://www.cytel.com/Software/LogXact.aspx",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110708215830/http://www.cytel.com/Software/StatXact.aspx",
          "name" : "https://web.archive.org/web/20110708215830/http://www.cytel.com/Software/StatXact.aspx",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17930",
          "name" : "https://www.exploit-db.com/exploits/17930",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18027",
          "name" : "https://www.exploit-db.com/exploits/18027",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18027",
          "name" : "https://www.exploit-db.com/exploits/18027",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/cytel-studio-cy3-file-stack-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/cytel-studio-cy3-file-stack-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cytel Studio version 9.0 and earlier is vulnerable to a stack-based buffer overflow triggered by parsing a malformed .CY3 file. The vulnerability occurs when the application copies user-controlled strings into a fixed-size stack buffer (256 bytes) without proper bounds checking. Exploitation allows arbitrary code execution when the crafted file is opened."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10014",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/gta_samp.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/gta_samp.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/gta_samp.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/gta_samp.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17893",
          "name" : "https://www.exploit-db.com/exploits/17893",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17893",
          "name" : "https://www.exploit-db.com/exploits/17893",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18038",
          "name" : "https://www.exploit-db.com/exploits/18038",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18038",
          "name" : "https://www.exploit-db.com/exploits/18038",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/gta-sa-mp-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/gta-sa-mp-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GTA San Andreas Multiplayer (SA-MP) server version 0.3.1.1 is vulnerable to a stack-based buffer overflow triggered by parsing a malformed server.cfg configuration file. The vulnerability allows local attackers to execute arbitrary code when the server binary (samp-server.exe) processes a crafted echo directive containing excessive input. The original 'sa-mp.com' site is defunct, but the community maintains mirrors and forks that may be vulnerable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10013",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nirix/traq/releases/tag/v2.3.1",
          "name" : "https://github.com/nirix/traq/releases/tag/v2.3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/traq_plugin_exec.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/multi/http/traq_plugin_exec.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110729003039/https://traqproject.org/",
          "name" : "https://web.archive.org/web/20110729003039/https://traqproject.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18213",
          "name" : "https://www.exploit-db.com/exploits/18213",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18239",
          "name" : "https://www.exploit-db.com/exploits/18239",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/traq-issue-tracking-system-rce",
          "name" : "https://www.vulncheck.com/advisories/traq-issue-tracking-system-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Traq versions 2.0 through 2.3 contain a remote code execution vulnerability in the admincp/common.php script. The flawed authorization logic fails to halt execution after a failed access check, allowing unauthenticated users to reach admin-only functionality. This can be exploited via plugins.php to inject and execute arbitrary PHP code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10012",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://netop.com/",
          "name" : "https://netop.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/netop.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/fileformat/netop.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120314075913/https://codework-systems.com/netop-remotecontrol-10-01-released/",
          "name" : "https://web.archive.org/web/20120314075913/https://codework-systems.com/netop-remotecontrol-10-01-released/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17223",
          "name" : "https://www.exploit-db.com/exploits/17223",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18697",
          "name" : "https://www.exploit-db.com/exploits/18697",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fortiguard.com/encyclopedia/ips/27765/netop-remote-control-dws-file-handling-buffer-overflow",
          "name" : "https://www.fortiguard.com/encyclopedia/ips/27765/netop-remote-control-dws-file-handling-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/netop-remote-control-client-dws-file-buffer-overflow",
          "name" : "https://www.vulncheck.com/advisories/netop-remote-control-client-dws-file-buffer-overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NetOp (now part of Impero Software) Remote Control Client v9.5 is vulnerable to a stack-based buffer overflow when processing .dws configuration files. If a .dws file contains a string longer than 520 bytes, the application fails to perform proper bounds checking, allowing an attacker to execute arbitrary code when the file is opened."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10011",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/linux/http/webid_converter.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceforge.net/projects/simpleauction/",
          "name" : "https://sourceforge.net/projects/simpleauction/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20121024110058/http://www.webidsupport.com/forums/showthread.php?3892",
          "name" : "https://web.archive.org/web/20121024110058/http://www.webidsupport.com/forums/showthread.php?3892",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17487",
          "name" : "https://www.exploit-db.com/exploits/17487",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18934",
          "name" : "https://www.exploit-db.com/exploits/18934",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/webid-remote-php-code-injection",
          "name" : "https://www.vulncheck.com/advisories/webid-remote-php-code-injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeBid 1.0.2 contains a remote code injection vulnerability in the converter.php script, where unsanitized input in the to parameter of a POST request is written directly into includes/currencies.php. This allows unauthenticated attackers to inject arbitrary PHP code, resulting in persistent remote code execution when the modified script is accessed or included by the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10010",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/quickshare_traversal_write.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/quickshare_traversal_write.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/quickshare_traversal_write.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/exploits/windows/ftp/quickshare_traversal_write.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110814125645/http://www.digital-echidna.org/2011/02/quickshare-file-share-1-2-1-directory-traversal-vulnerability/",
          "name" : "https://web.archive.org/web/20110814125645/http://www.digital-echidna.org/2011/02/quickshare-file-share-1-2-1-directory-traversal-vulnerability/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120125101026/http://www.quicksharehq.com/blog/quickshare-file-server-1-2-2-released.html",
          "name" : "https://web.archive.org/web/20120125101026/http://www.quicksharehq.com/blog/quickshare-file-server-1-2-2-released.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/16105",
          "name" : "https://www.exploit-db.com/exploits/16105",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/18933",
          "name" : "https://www.exploit-db.com/exploits/18933",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/quickshare-file-server-path-traversal-rce",
          "name" : "https://www.vulncheck.com/advisories/quickshare-file-server-path-traversal-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "QuickShare File Server 1.2.1 contains a path traversal vulnerability in its FTP service due to improper sanitation of user-supplied file paths. Authenticated users can exploit this flaw by submitting crafted sequences to access or write files outside the intended virtual directory. When the \"Writable\" option is enabled (default during account creation), this allows attackers to upload arbitrary files to privileged locations such as system32, enabling remote code execution via MOF injection or executable placement."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2011-10009",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/s40_traversal.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/s40_traversal.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/s40_traversal.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/scanner/http/s40_traversal.rb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20110613222630/http://y-osirys.com/security/exploits/id27",
          "name" : "https://web.archive.org/web/20110613222630/http://y-osirys.com/security/exploits/id27",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://web.archive.org/web/20120531114058/http://s40.biz/",
          "name" : "https://web.archive.org/web/20120531114058/http://s40.biz/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/17129",
          "name" : "https://www.exploit-db.com/exploits/17129",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vulncheck.com/advisories/s40-cms-path-traversal",
          "name" : "https://www.vulncheck.com/advisories/s40-cms-path-traversal",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "S40 CMS v0.4.2 contains a path traversal vulnerability in its index.php page handler. The p parameter is not properly sanitized, allowing attackers to traverse the file system and access arbitrary files outside the web root. This can be exploited remotely without authentication by appending traversal sequences and a null byte to bypass file extension checks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T21:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8927",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-307"
          }, {
            "lang" : "en",
            "value" : "CWE-799"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/mtons/mblog/issues/ICPMJR",
          "name" : "https://gitee.com/mtons/mblog/issues/ICPMJR",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319886",
          "name" : "VDB-319886 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319886",
          "name" : "VDB-319886 | mtons mblog Verification Code send_code excessive authentication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.631654",
          "name" : "Submit #631654 | mtons https://gitee.com/mtons/mblog  <=3.5.0 Email Enumeration",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in mtons mblog up to 3.5.0. Affected by this issue is some unknown functionality of the file /email/send_code of the component Verification Code Handler. The manipulation of the argument email leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T20:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8926",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438",
          "name" : "https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319885",
          "name" : "VDB-319885 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319885",
          "name" : "VDB-319885 | SourceCodester COVID 19 Testing Management System login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631603",
          "name" : "Submit #631603 | SourceCodester COVID 19 Testing Management System Project V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438",
          "name" : "https://github.com/lrjbsyh/CVE_Hunter/issues/2#issue-3307768438",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester COVID 19 Testing Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unyasoft:covid19_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T20:15Z",
    "lastModifiedDate" : "2025-08-15T20:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43988",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/9EB08033PW#2b7dTc2x705W",
          "name" : "https://drive.proton.me/urls/9EB08033PW#2b7dTc2x705W",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43988.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43988.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "name" : "https://github.com/actuator/cve/tree/main/Kuwfi",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://kuwfi.com/products/nsa-sa-25gbps-kuwfi-6000mah-wifi-router-5g-dual-band-128users-portable-5g-wifi-router-with-sim-card-slot",
          "name" : "https://kuwfi.com/products/nsa-sa-25gbps-kuwfi-6000mah-wifi-router-5g-dual-band-128users-portable-5g-wifi-router-with-sim-card-slot",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "KuWFi 5G01-X55 FL2020_V0.0.12 devices expose an unauthenticated API endpoint (ajax_get.cgi), allowing remote attackers to retrieve sensitive configuration data, including admin credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T20:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43986",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43986.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Kuwfi/CVE-2025-43986.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/kuwfi",
          "name" : "https://github.com/actuator/cve/tree/main/kuwfi",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.kuwfi.com/products/300mbps-industrial-router-cat4-4g-cpe-router-extender-strong-wifi-signal-suport-32wifi-users-with-sim-card-slot-95",
          "name" : "https://www.kuwfi.com/products/300mbps-industrial-router-cat4-4g-cpe-router-extender-strong-wifi-signal-suport-32wifi-users-with-sim-card-slot-95",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered on KuWFi GC111 GC111-GL-LM321_V3.0_20191211 devices. The TELNET service is enabled by default and exposed over the WAN interface without authentication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T20:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43982",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43982.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43982.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/Tuoshi",
          "name" : "https://github.com/actuator/cve/tree/main/Tuoshi",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices enable the SSH service by default. There is a hidden hard-coded root account that cannot be disabled in the GUI."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T20:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8925",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Kerjo01/day1/issues/1",
          "name" : "https://github.com/Kerjo01/day1/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319884",
          "name" : "VDB-319884 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319884",
          "name" : "VDB-319884 | itsourcecode Sports Management System match.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631551",
          "name" : "Submit #631551 | itsourcecode Sports Management System V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Sports Management System 1.0. Affected is an unknown function of the file /Admin/match.php. The manipulation of the argument code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:sports_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-14T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8924",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/jue22/cve/issues/1",
          "name" : "https://github.com/jue22/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319883",
          "name" : "VDB-319883 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319883",
          "name" : "VDB-319883 | Campcodes Online Water Billing System viewbill.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631543",
          "name" : "Submit #631543 | Campcodes Online Water Billing System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Campcodes Online Water Billing System 1.0. This issue affects some unknown processing of the file /viewbill.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:online_water_billing_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8923",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/caesar-power/CVE/issues/3",
          "name" : "https://github.com/caesar-power/CVE/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319882",
          "name" : "VDB-319882 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319882",
          "name" : "VDB-319882 | code-projects Job Diary edit-details.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631296",
          "name" : "Submit #631296 | code-projects Job Diary V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in code-projects Job Diary 1.0. This vulnerability affects unknown code of the file /edit-details.php. The manipulation of the argument ID leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_diary:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8922",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/caesar-power/CVE/issues/2",
          "name" : "https://github.com/caesar-power/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319881",
          "name" : "VDB-319881 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319881",
          "name" : "VDB-319881 | code-projects Job Diary admin-inbox.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631295",
          "name" : "Submit #631295 | code-projects Job Diary V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Job Diary 1.0. This affects an unknown part of the file /admin-inbox.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_diary:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45313",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://hortusfox-web.com",
          "name" : "http://hortusfox-web.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45313/CVE-2025-45313.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45313/CVE-2025-45313.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability in the /tasks endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the title parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-15T20:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43989",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZAp",
          "name" : "https://drive.proton.me/urls/H7J1DPNA00#XrmRLENzyZAp",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmr",
          "name" : "https://drive.proton.me/urls/QDVK6E2SBR#8LlpbHWzHdmr",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txt",
          "name" : "https://github.com/actuator/cve/blob/main/Tuoshi/CVE-2025-43989.txt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/actuator/cve/tree/main/Tuoshi",
          "name" : "https://github.com/actuator/cve/tree/main/Tuoshi",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The /goform/formJsonAjaxReq POST endpoint of Shenzhen Tuoshi NR500-EA RG500UEAABxCOMSLICv3.4.2731.16.43 devices mishandles the set_timesetting action with the ntpserver0 parameter, which is used in a system command. By setting a username=admin cookie (bypassing normal session checks), an unauthenticated attacker can use that parameter to execute arbitrary OS commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T19:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8921",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/caesar-power/CVE/issues/1",
          "name" : "https://github.com/caesar-power/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319880",
          "name" : "VDB-319880 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319880",
          "name" : "VDB-319880 | code-projects Job Diary user-apply.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.631294",
          "name" : "Submit #631294 | code-projects Job Diary V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Job Diary 1.0. Affected by this issue is some unknown functionality of the file /user-apply.php. The manipulation of the argument job_title leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_diary:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8920",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8920.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_dicionario-de-termos-bncc%20parameter%20Planos%20de%20ensino%20input%20field.md",
          "name" : "https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_dicionario-de-termos-bncc%20parameter%20Planos%20de%20ensino%20input%20field.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319879",
          "name" : "VDB-319879 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319879",
          "name" : "VDB-319879 | Portabilis i-Diario Dicionário de Termos BNCC dicionario-de-termos-bncc cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629168",
          "name" : "Submit #629168 | Portabilis i-diário 1.6 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Portabilis i-Diario 1.6. Affected by this vulnerability is an unknown functionality of the file /dicionario-de-termos-bncc of the component Dicionário de Termos BNCC Page. The manipulation of the argument Planos de ensino leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8919",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-diario/CVE-2025-8919.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/FeMarb/CVEs/tree/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario",
          "name" : "https://github.com/FeMarb/CVEs/tree/6eeefb2749bb6165557ed4664a0680456131e4de/I-diario",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319878",
          "name" : "VDB-319878 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319878",
          "name" : "VDB-319878 | Portabilis i-Diario History objetivos-de-aprendizagem-e-habilidades cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.629166",
          "name" : "Submit #629166 | Portabilis i-diário 1.6 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Portabilis i-Diario up to 1.6. Affected is an unknown function of the file /objetivos-de-aprendizagem-e-habilidades of the component History Page. The manipulation of the argument código/objetivo habilidade leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8904",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-017/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-017/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-release-app-versions-7.x.html",
          "name" : "https://docs.aws.amazon.com/emr/latest/ReleaseGuide/emr-release-app-versions-7.x.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Amazon EMR Secret Agent creates a keytab file containing Kerberos credentials. This file is stored in the /tmp/ directory. A user with access to this directory and another account can potentially decrypt the keys and escalate to higher privileges. \n\n\n\nUsers are advised to upgrade to Amazon EMR version 7.5 or higher. For Amazon EMR releases between 6.10 and 7.4, we strongly recommend that you run the bootstrap script and RPM files with the fix provided in the location below."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8770",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/549105",
          "name" : "GitLab Issue #549105",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE affecting all versions from 18.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2 that could have allowed authenticated users with specific access to bypass merge request approval policies by manipulating approval rule identifiers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8754",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=2NGA002743&LanguageCode=en&DocumentPartId=&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=2NGA002743&LanguageCode=en&DocumentPartId=&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authentication for Critical Function vulnerability in ABB ABB AbilityTM zenon.This issue affects ABB AbilityTM zenon: from 7.50 through 14."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7739",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/556111",
          "name" : "GitLab Issue #556111",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3255849",
          "name" : "HackerOne Bug Bounty Report #3255849",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 18.2 before 18.2.2 that, under certain conditions, could have allowed authenticated users to achieve stored cross-site scripting by injecting malicious HTML content in scoped label descriptions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7734",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/556090",
          "name" : "GitLab Issue #556090",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3247096",
          "name" : "HackerOne Bug Bounty Report #3247096",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 14.2 before 18.0.6, 18.1 before 18.1.4 and 18.2 before 18.2.2 that, under certain conditions, could have allowed a successful attacker to execute actions on behalf of users by injecting malicious content."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "14.2.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "14.2.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6186",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/549844",
          "name" : "GitLab Issue #549844",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3189522",
          "name" : "HackerOne Bug Bounty Report #3189522",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to achieve account takeover by injecting malicious HTML into work item names."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5819",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/548165",
          "name" : "GitLab Issue #548165",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3137660",
          "name" : "HackerOne Bug Bounty Report #3137660",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 15.7 before 17.11.6, 18.0 before 18.0.4, and 18.1 before 18.1.2 that could have allowed authenticated users with developer access to obtain ID tokens for protected branches under certain circumstances."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "15.7.0",
          "versionEndExcluding" : "17.11.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.7.0",
          "versionEndExcluding" : "17.11.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50946",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-50946/CVE-2025-50946.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-50946/CVE-2025-50946.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/OliveTin/OliveTin",
          "name" : "https://github.com/OliveTin/OliveTin",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/OliveTin/OliveTin/blob/8c073bf45fca6c6eda4e8a9feb182433277343ee/service/internal/executor/arguments.go#L211",
          "name" : "https://github.com/OliveTin/OliveTin/blob/8c073bf45fca6c6eda4e8a9feb182433277343ee/service/internal/executor/arguments.go#L211",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OS Command Injection in Olivetin 2025.4.22 Custom Themes via the ParseRequestURI function in service/internal/executor/arguments.go."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50617",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/10",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_0046ed68 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wps_set in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50616",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/9",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_0046f984 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_advanced_set in the payload, which can cause the program to crash and lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50615",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/8",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00470c50 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_mac_filter_set in the payload, which can cause the program to crash and lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T20:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45317",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45317/CVE-2025-45317.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45317/CVE-2025-45317.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/ImportModule.php#L28",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/ImportModule.php#L28",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A zip slip vulnerability in the /modules/ImportModule.php component of hortusfox-web v4.4 allows attackers to execute arbitrary code via a crafted archive."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T20:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45316",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45316/CVE-2025-45316.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45316/CVE-2025-45316.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/models/ChatMsgModel.php#L47",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/models/ChatMsgModel.php#L47",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/TextBlockModule.php#L15",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/TextBlockModule.php#L15",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/TextBlockModule.php#L201",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/modules/TextBlockModule.php#L201",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/views/chat.php#L66",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/views/chat.php#L66",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability in the TextBlockModule.php component of hortusfox-web v4.4 allows attackers to execute arbitrary web scripts or HTML via injecting a crafted payload into the name parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45315",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://hortusfox-web.com",
          "name" : "http://hortusfox-web.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45315/CVE-2025-45315.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45315/CVE-2025-45315.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web",
          "name" : "https://github.com/danielbrendel/hortusfox-web",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/controller/admin.php#L192",
          "name" : "https://github.com/danielbrendel/hortusfox-web/blob/8ab851101a62d8eb311235c118eeeb32a9b36978/app/controller/admin.php#L192",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability in the /controller/admin.php endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the email parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45314",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://hortusfox-web.com",
          "name" : "http://hortusfox-web.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45314/CVE-2025-45314.md",
          "name" : "https://github.com/chrisWalker11/Cves/blob/main/CVE-2025-45314/CVE-2025-45314.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/danielbrendel/hortusfox-web",
          "name" : "https://github.com/danielbrendel/hortusfox-web",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability in the /Calendar endpoint of hortusfox-web v4.4 allows attackers to execute arbitrary JavaScript in the context of a user's browser via a crafted payload injected into the add function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hortusfox:hortusfox:4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2937",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1333"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/528995",
          "name" : "GitLab Issue #528995",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3058879",
          "name" : "HackerOne Bug Bounty Report #3058879",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 13.2 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed authenticated users to create a denial of service condition by sending specially crafted markdown payloads to the Wiki feature."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "13.2.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "13.2.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2614",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/526349",
          "name" : "GitLab Issue #526349",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3015894",
          "name" : "HackerOne Bug Bounty Report #3015894",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 11.6 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed an authenticated user to cause a denial of service condition by creating specially crafted content that consumes excessive server resources when processed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "11.6.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "11.6.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2498",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/525515",
          "name" : "GitLab Issue #525515",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3037722",
          "name" : "HackerOne Bug Bounty Report #3037722",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper access control in Gitlab EE affecting all versions from 12.0 prior to 18.0.6, 18.1 prior to 18.1.4, and 18.2 prior to 18.2.2 that under certain conditions could have allowed users to view assigned issues from restricted groups by bypassing IP restrictions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23306",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23306",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23306",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5685",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5685",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23306",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23306",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Megatron-LM for all platforms contains a vulnerability in the megatron/training/\narguments.py component where an attacker could cause a code injection issue by providing a malicious input. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23305",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23305",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23305",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5685",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5685",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23305",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23305",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Megatron-LM for all platforms contains a vulnerability in the tools component, where an attacker may exploit a code injection issue. A successful exploit of this vulnerability may lead to code execution, escalation of privileges, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23304",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23304",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23304",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5686",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5686",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23304",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23304",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA NeMo library for all platforms contains a vulnerability in the model loading component, where an attacker could cause code injection by loading .nemo files with maliciously crafted metadata. A successful exploit of this vulnerability may lead to remote code execution and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23303",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23303",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23303",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5686",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5686",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23303",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23303",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA NeMo Framework for all platforms contains a vulnerability where a user could cause a deserialization of untrusted data by remote code execution. A successful exploit of this vulnerability might lead to code execution and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23298",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23298",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23298",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5683",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5683",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23298",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23298",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Merlin Transformers4Rec for all platforms contains a vulnerability in a python dependency, where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23296",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23296",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23296",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5681",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5681",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23296",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23296",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Isaac-GR00T for all platforms contains a vulnerability in a Python component where an attacker could cause a code injection issue. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23295",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23295",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23295",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5680",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5680",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23295",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23295",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Apex for all platforms contains a vulnerability in a Python component where an attacker could cause a code injection issue by providing a malicious file. A successful exploit of this vulnerability might lead to code execution, escalation of privileges, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23294",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23294",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23294",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5658",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5658",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23294",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23294",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA WebDataset for all platforms contains a vulnerability where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1477",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/520353",
          "name" : "GitLab Issue #520353",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2987614",
          "name" : "HackerOne Bug Bounty Report #2987614",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 8.14 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed an unauthenticated user to create a denial of service condition by sending specially crafted payloads to specific integration API endpoints."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "8.1.4",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "8.1.4",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-5477",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/us-en/document/ish_12878449-12878471-16/hpsbhf04043",
          "name" : "https://support.hp.com/us-en/document/ish_12878449-12878471-16/hpsbhf04043",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A potential security vulnerability has been identified in the System BIOS for some HP PC products which may allow escalation of privilege, arbitrary code execution, denial of service, or information disclosure via a physical attack that requires specialized equipment and knowledge.  HP is releasing firmware mitigation for the potential vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-12303",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/508298",
          "name" : "GitLab Issue #508298",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2861889",
          "name" : "HackerOne Bug Bounty Report #2861889",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.7 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that under certain conditions could have allowed authenticated users with specific roles and permissions to delete issues including confidential ones by inviting users with a specific role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-10219",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/500134",
          "name" : "GitLab Issue #500134",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2780353",
          "name" : "HackerOne Bug Bounty Report #2780353",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 15.6 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that under certain conditions could have allowed authenticated users to bypass access controls and download private artifacts by accessing specific API endpoints."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "15.6.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.6.0",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52385",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cwe.mitre.org/data/definitions/78.html",
          "name" : "https://cwe.mitre.org/data/definitions/78.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cwe.mitre.org/data/definitions/94.html",
          "name" : "https://cwe.mitre.org/data/definitions/94.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Kov404/CVE-2025-52385/tree/main",
          "name" : "https://github.com/Kov404/CVE-2025-52385/tree/main",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Studio3T/robomongo",
          "name" : "https://github.com/Studio3T/robomongo",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://robomongo.org/",
          "name" : "https://robomongo.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in Studio 3T v.2025.1.0 and before allows a remote attacker to execute arbitrary code via a crafted payload to the child_process module"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51451",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://n200re.com",
          "name" : "http://n200re.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://gist.github.com/lin-3-start/e42344d5caea881e5429fdd40fad1fd8",
          "name" : "https://gist.github.com/lin-3-start/e42344d5caea881e5429fdd40fad1fd8",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/204/ids/36.html",
          "name" : "https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/204/ids/36.html",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In TOTOLINK EX1200T firmware 4.1.2cu.5215, an attacker can bypass login by sending a specific request through formLoginAuth.htm."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:ex1200t_firmware:4.1.2cu.5215:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:ex1200t:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-14T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50594",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.aecyberpro.com/blog/general/2025-04-30-Account-Takeover-BOLA-Hospital-Management-System-EMR/",
          "name" : "https://www.aecyberpro.com/blog/general/2025-04-30-Account-Takeover-BOLA-Hospital-Management-System-EMR/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in /Code/Websites/DanpheEMR/Controllers/Settings/SecuritySettingsController.cs in Danphe Health Hospital Management System EMR 3.2 allowing attackers to reset any account password."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-34153",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc",
          "name" : "https://gist.github.com/VAMorales/32794cccc2195a935623a12ef32760dc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support.hyland.com/r/OnBase/WorkView/Foundation-24.1/WorkView/Installation/Upgrade-Considerations/Upgrading-to-OnBase-Version-Foundation-24.1",
          "name" : "https://support.hyland.com/r/OnBase/WorkView/Foundation-24.1/WorkView/Installation/Upgrade-Considerations/Upgrading-to-OnBase-Version-Foundation-24.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.hyland.com/en/internal/onbase-unity-client",
          "name" : "https://www.hyland.com/en/internal/onbase-unity-client",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Hyland OnBase versions prior to 17.0.2.87 (other versions may be affected) are vulnerable to unauthenticated remote code execution via insecure deserialization on the .NET Remoting TCP channel. The service registers a listener on port 6031 with the URI endpoint TimerServer, implemented in Hyland.Core.Timers.dll. This endpoint deserializes untrusted input using the .NET BinaryFormatter, allowing attackers to execute arbitrary code under the context of NT AUTHORITY\\SYSTEM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2184",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-2184",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-2184",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A credential management flaw in Palo Alto Networks Cortex XDR® Broker VM causes different Broker VM images to share identical default credentials for internal services. Users knowing these default credentials could access internal services on other Broker VM installations.\n\nThe attacker must have network access to the Broker VM to exploit this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2183",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-2183",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-2183",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An insufficient certificate validation issue in the Palo Alto Networks GlobalProtect™ app enables attackers to connect the GlobalProtect app to arbitrary servers. This can enable a local non-administrative operating system user or an attacker on the same subnet to install malicious root certificates on the endpoint and subsequently install malicious software signed by the malicious root certificates on that endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2182",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-2182",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-2182",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A problem with the implementation of the MACsec protocol in Palo Alto Networks PAN-OS® results in the cleartext exposure of the connectivity association key (CAK). This issue is only applicable to PA-7500 Series devices which are in an NGFW cluster.\nA user who possesses this key can read messages being sent between devices in a NGFW Cluster. There is no impact in non-clustered firewalls or clusters of firewalls that do not enable MACsec."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2181",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-2181",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-2181",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A sensitive information disclosure vulnerability in Palo Alto Networks Checkov by Prisma® Cloud can result in the cleartext exposure of Prisma Cloud access keys in Checkov's output."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2180",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-2180",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-2180",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unsafe deserialization vulnerability in Palo Alto Networks Checkov by Prisma® Cloud allows an authenticated user to execute arbitrary code as a non administrative user by scanning a malicious terraform file when using Checkov in Prisma® Cloud.\n\nThis issue impacts Checkov 3.0 versions earlier than Checkov 3.2.415."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8918",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/i-educar/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_educar_instituicao_cad.php%20parameter%20neighborhood%20name.md",
          "name" : "https://github.com/FeMarb/CVEs/blob/6eeefb2749bb6165557ed4664a0680456131e4de/i-educar/Cross-Site%20Scripting%20(XSS)%20Storage%20in%20endpoint%20_educar_instituicao_cad.php%20parameter%20neighborhood%20name.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319877",
          "name" : "VDB-319877 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319877",
          "name" : "VDB-319877 | Portabilis i-Educar Editar educar_instituicao_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.629164",
          "name" : "Submit #629164 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar up to 2.10. This issue affects some unknown processing of the file /intranet/educar_instituicao_cad.php of the component Editar Page. The manipulation of the argument neighborhood name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.10.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-14T01:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51452",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://a7000rfirmware.com",
          "name" : "http://a7000rfirmware.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://gist.github.com/lin-3-start/5b20f6fbe3aa0c3fc75f320cd589182a",
          "name" : "https://gist.github.com/lin-3-start/5b20f6fbe3aa0c3fc75f320cd589182a",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/171/ids/36.html",
          "name" : "https://www.totolink.net/home/menu/detail/menu_listtpl/download/id/171/ids/36.html",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In TOTOLINK A7000R firmware 9.1.0u.6115_B20201022, an attacker can bypass login by sending a specific request through formLoginAuth.htm."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:a7000r_firmware:9.1.0u.6115_b20201022:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:a7000r:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50614",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/7",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in the Netis WF2880 v2.1.40207 in the FUN_0047151c function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wds_set in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-14T17:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50613",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/6",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00475e1c function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wds_key_wep in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-18T18:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50612",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/5",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in the Netis WF2880 v2.1.40207 in the FUN_004743f8 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_sec_set in the payload, which may cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-18T18:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50611",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/4",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00473154 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_sec_set_5g and wl_sec_rp_set_5g in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-15T19:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50610",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/3",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00476598 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_base_set_5g in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-15T19:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50609",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/2",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the Function_00465620 of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of specify_parame in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-15T19:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50608",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/1",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2880-cgitest.cgi-Vulnerability/tree/main/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability has been discovered in Netis WF2880 v2.1.40207 in the FUN_00471994 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the value of wl_base_set in the payload, which can cause the program to crash and potentially lead to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2880_firmware:2.1.40207:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2880:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T16:15Z",
    "lastModifiedDate" : "2025-08-15T19:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8941",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-8941",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-8941",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2388220",
          "name" : "RHBZ#2388220",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \"complete\" fix for CVE-2025-6020."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55163",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
          "name" : "https://github.com/netty/netty/security/advisories/GHSA-prj3-ccx8-p6x4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Netty is an asynchronous, event-driven network application framework. Prior to versions 4.1.124.Final and 4.2.4.Final, Netty is vulnerable to MadeYouReset DDoS. This is a logical vulnerability in the HTTP/2 protocol, that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit - which results in resource exhaustion and distributed denial of service. This issue has been patched in versions 4.1.124.Final and 4.2.4.Final."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54809",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000152049",
          "name" : "https://my.f5.com/manage/s/article/K000152049",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "F5 Access for Android before version 3.1.2 which uses HTTPS does not verify the remote endpoint identity.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54500",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000152001",
          "name" : "https://my.f5.com/manage/s/article/K000152001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An HTTP/2 implementation flaw allows a denial-of-service (DoS) that uses malformed HTTP/2 control frames in order to break the max concurrent streams limit (HTTP/2 MadeYouReset Attack). \n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53859",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000152786",
          "name" : "https://my.f5.com/manage/s/article/K000152786",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method \"none,\" and (3) the authentication server returns the \"Auth-Wait\" response header.\n\n\n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52585",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000141436",
          "name" : "https://my.f5.com/manage/s/article/K000141436",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a BIG-IP LTM Client SSL profile is configured on a virtual server with SSL Forward Proxy enabled and Anonymous Diffie-Hellman (ADH) ciphers enabled, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51691",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/0x72303074/CVE-Disclosures/tree/main/MarkTwo%20Markdown%20Editor/CVE-2025-51691",
          "name" : "https://github.com/0x72303074/CVE-Disclosures/tree/main/MarkTwo%20Markdown%20Editor/CVE-2025-51691",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/anthonygarvan/marktwo",
          "name" : "https://github.com/anthonygarvan/marktwo",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://marktwo.app/try-it-now",
          "name" : "https://marktwo.app/try-it-now",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Scripting (XSS) vulnerability found in MarkTwo commit e3a1d3f90cce4ea9c26efcbbf3a1cbfb9dcdb298 (May 2025) allows a remote attacker to execute arbitrary code via a crafted script input to the editor interface. The application does not properly sanitize user-supplied Markdown before rendering it. Successful exploitation could lead to session hijacking, credential theft, or arbitrary client-side code execution in the context of the victim's browser."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50690",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/OSGeo/spatialreference.org",
          "name" : "https://github.com/OSGeo/spatialreference.org",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://medium.com/@Justinsecure/cracking-open-a-reflected-xss-in-spatialreference-org-fcc42175ae6b",
          "name" : "https://medium.com/@Justinsecure/cracking-open-a-reflected-xss-in-spatialreference-org-fcc42175ae6b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Cross-Site Scripting (XSS) vulnerability exists in SpatialReference.org (OSGeo/spatialreference.org) versions prior to 2025-05-17 (commit 2120adfa17ddd535bd0f539e6c4988fa3a2cb491). The vulnerability is caused by improper handling of user input in the search query parameter. An attacker can craft a specially formed URL with malicious JavaScript code, which is then reflected back and executed in the victim's browser. This flaw allows an attacker to execute arbitrary JavaScript in the context of the victim's session, potentially leading to session hijacking, phishing attacks, data theft, or redirection to malicious sites. The issue is exposed on publicly accessible pages, making it exploitable by an unauthenticated attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50635",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Chinesexilinyu/Netis-WF2780-cgitest.cgi-Vulnerability/tree/main/1",
          "name" : "https://github.com/Chinesexilinyu/Netis-WF2780-cgitest.cgi-Vulnerability/tree/main/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A null pointer dereference vulnerability was discovered in Netis WF2780 v2.2.35445. The vulnerability exists in the FUN_0048a728 function of the cgitest.cgi file. Attackers can trigger this vulnerability by controlling the CONTENT_LENGTH variable, causing the program to crash and potentially leading to a denial-of-service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netis-systems:wf2780_firmware:2.2.35445:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netis-systems:wf2780:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-15T19:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50251",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://packetstorm.news/files/id/190475/",
          "name" : "https://packetstorm.news/files/id/190475/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/52211",
          "name" : "https://www.exploit-db.com/exploits/52211",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server side request forgery (SSRF) vulnerability in makeplane plane 0.23.1 via the password recovery."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48500",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-353"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000151782",
          "name" : "https://my.f5.com/manage/s/article/K000151782",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A missing file integrity check vulnerability exists on MacOS F5 VPN browser client installer that may allow a local, authenticated attacker with access to the local file system to replace it with a malicious package installer. \nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46405",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000151546",
          "name" : "https://my.f5.com/manage/s/article/K000151546",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When Network Access is configured on a BIG-IP APM virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T15:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55668",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-384"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47",
          "name" : "https://lists.apache.org/thread/v6bknr96rl7l1qxkl1c03v0qdvbbqs47",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Session Fixation vulnerability in Apache Tomcat via rewrite valve.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.7, from 10.1.0-M1 through 10.1.41, from 9.0.0.M1 through 9.0.105.\nOlder, EOL versions may also be affected.\n\nUsers are recommended to upgrade to version 11.0.8, 10.1.42 or 9.0.106, which fix the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.1.42",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.0.0",
          "versionEndExcluding" : "11.0.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.0.1",
          "versionEndExcluding" : "9.0.106",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-18T18:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55160",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-758"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6hgw-6x87-578x",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-6hgw-6x87-578x",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, there is undefined behavior (function-type-mismatch) in splay tree cloning callback. This results in a deterministic abort under UBSan (DoS in sanitizer builds), with no crash in a non-sanitized build. This issue has been patched in versions 6.9.13-27 and 7.1.2-1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.9.13-27",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0-0",
          "versionEndExcluding" : "7.1.2-1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-15T19:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55154",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-qp29-wxp5-wh82",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://goo.gle/bigsleep",
          "name" : "https://goo.gle/bigsleep",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55005",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://goo.gle/bigsleep",
          "name" : "https://goo.gle/bigsleep",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-v393-38qx-v8fp",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-1, when preparing to transform from Log to sRGB colorspaces, the logmap construction fails to handle cases where the reference-black or reference-white value is larger than 1024. This leads to corrupting memory beyond the end of the allocated logmap buffer. This issue has been patched in version 7.1.2-1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.1.2-1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-15T19:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55004",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://goo.gle/bigsleep",
          "name" : "https://goo.gle/bigsleep",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw",
          "name" : "https://github.com/ImageMagick/ImageMagick/security/advisories/GHSA-cjc8-g9w8-chfw",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to version 7.1.2-1, ImageMagick is vulnerable to heap-buffer overflow read around the handling of images with separate alpha channels when performing image magnification in ReadOneMNGIMage. This can likely be used to leak subsequent memory contents into the output image. This issue has been patched in version 7.1.2-1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imagemagick:imagemagick:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.1.2-1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-15T19:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54791",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ome/omero-web/commit/8aa2789e8f759c73f1517abe9a0abd44e86644ad",
          "name" : "https://github.com/ome/omero-web/commit/8aa2789e8f759c73f1517abe9a0abd44e86644ad",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ome/omero-web/security/advisories/GHSA-gpmg-4x4g-mr5r",
          "name" : "https://github.com/ome/omero-web/security/advisories/GHSA-gpmg-4x4g-mr5r",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OMERO.web provides a web based client and plugin infrastructure. Prior to version 5.29.2, if an error occurred when resetting a user's password using the Forgot Password option in OMERO.web, the error message displayed on the Web page can disclose information about the user. This issue has been patched in version 5.29.2. A workaround involves disabling the Forgot password option in OMERO.web using the omero.web.show_forgot_password configuration property."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54382",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-gjp6-9cvg-8w93",
          "name" : "https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-gjp6-9cvg-8w93",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cherry Studio is a desktop client that supports for multiple LLM providers. In version 1.5.1, a remote code execution (RCE) vulnerability exists in the Cherry Studio platform when connecting to streamableHttp MCP servers. The issue arises from the server’s implicit trust in the oauth auth redirection endpoints and failure to properly sanitize the URL. This issue has been patched in version 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54074",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CherryHQ/cherry-studio/commit/40f9601379150854826ff3572ef7372fb0acdc38",
          "name" : "https://github.com/CherryHQ/cherry-studio/commit/40f9601379150854826ff3572ef7372fb0acdc38",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-8xr5-732g-84px",
          "name" : "https://github.com/CherryHQ/cherry-studio/security/advisories/GHSA-8xr5-732g-84px",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cherry Studio is a desktop client that supports for multiple LLM providers. From versions 1.2.5 to 1.5.1, Cherry Studio is vulnerable to OS Command Injection during a connection with a malicious MCP server in HTTP Streamable mode. Attackers can setup a malicious MCP server with compatible OAuth authorization server endpoints and trick victims into connecting it, leading to OS command injection in vulnerable clients. This issue has been patched in version 1.5.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52392",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://beafn28.gitbook.io/beafn28/cve/brute-force-login-vulnerability-in-soosyze-cms-2.0-cve-2025-52392",
          "name" : "https://beafn28.gitbook.io/beafn28/cve/brute-force-login-vulnerability-in-soosyze-cms-2.0-cve-2025-52392",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/soosyze/soosyze/issues/269",
          "name" : "https://github.com/soosyze/soosyze/issues/269",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.exploit-db.com/exploits/52416",
          "name" : "https://www.exploit-db.com/exploits/52416",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Soosyze CMS 2.0 allows brute-force login attacks via the /user/login endpoint due to missing rate-limiting and lockout mechanisms. An attacker can repeatedly submit login attempts without restrictions, potentially gaining unauthorized administrative access. This vulnerability corresponds to CWE-307: Improper Restriction of Excessive Authentication Attempts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52386",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CycloneDX/Sunshine",
          "name" : "https://github.com/CycloneDX/Sunshine",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/VishalSreenivas/Formula-Injection-in-CycloneDX-Sunshine/blob/main/CVE-2025-52386.md",
          "name" : "https://github.com/VishalSreenivas/Formula-Injection-in-CycloneDX-Sunshine/blob/main/CVE-2025-52386.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/VishalSreenivas/Formula-Injection-in-CycloneDX-Sunshine/blob/main/payload.json",
          "name" : "https://github.com/VishalSreenivas/Formula-Injection-in-CycloneDX-Sunshine/blob/main/payload.json",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CycloneDX Sunshine v0.9 is vulnerable to CSV Formula Injection via a crafted JSON file"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32451",
        "ASSIGNER" : "talos-cna@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-824"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2202",
          "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2202",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A memory corruption vulnerability exists in Foxit Reader 2025.1.0.27937 due to the use of an uninitialized pointer. A specially crafted Javascript code inside a malicious PDF document can trigger this vulnerability, which can lead to memory corruption and result in arbitrary code execution. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability. Exploitation is also possible if a user visits a specially crafted, malicious site if the browser plugin extension is enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T14:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8908",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/jackyliu666/event/",
          "name" : "https://github.com/jackyliu666/event/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319862",
          "name" : "VDB-319862 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319862",
          "name" : "VDB-319862 | Shanghai Lingdang Information Technology Lingdang CRM event.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626276",
          "name" : "Submit #626276 | Shanghai Lingdang Information Technology Co., Ltd Ling Dang CRM System <= V8.6.5.2.23 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jackyliu666/blob2/blob/main/README.md",
          "name" : "https://github.com/jackyliu666/blob2/blob/main/README.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jackyliu666/event/",
          "name" : "https://github.com/jackyliu666/event/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.5.4. Affected by this issue is some unknown functionality of the file crm/WeiXinApp/yunzhijia/event.php. The manipulation of the argument openid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 8.6.5 is able to address this issue. It is recommended to upgrade the affected component. The vendor explains: \"All SQL injection vectors were patched via parameterized queries and input sanitization in v8.6.5+.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T13:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8907",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.319861",
          "name" : "VDB-319861 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319861",
          "name" : "VDB-319861 | H3C M2 NAS Webserver Configuration unnecessary privileges",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624554",
          "name" : "Submit #624554 | H3C M2 V100R006 Misconfiguration",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.notion.so/23f54a1113e7804bae88e76f9fb0cf5b",
          "name" : "https://www.notion.so/23f54a1113e7804bae88e76f9fb0cf5b",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in H3C M2 NAS V100R006. Affected by this vulnerability is an unknown functionality of the component Webserver Configuration. The manipulation leads to execution with unnecessary privileges. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor explains: \"[T]he device only has configuration files and does not actually have boa functionality. It is impossible to access or upload files anonymously to the device through boa services\". This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T13:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8671",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80",
          "name" : "https://github.com/h2o/h2o/commit/4729b661e3c6654198d2cc62997e1af58bef4b80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq",
          "name" : "https://github.com/h2o/h2o/security/advisories/GHSA-mrjm-qq9m-9mjq",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://galbarnahum.com/made-you-reset",
          "name" : "https://galbarnahum.com/made-you-reset",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325",
          "name" : "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://kb.cert.org/vuls/id/767506",
          "name" : "https://kb.cert.org/vuls/id/767506",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support2.windriver.com/index.php?page=security-notices",
          "name" : "https://support2.windriver.com/index.php?page=security-notices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://varnish-cache.org/security/VSV00017.html",
          "name" : "https://varnish-cache.org/security/VSV00017.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fastlystatus.com/incident/377810",
          "name" : "https://www.fastlystatus.com/incident/377810",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.suse.com/support/kb/doc/?id=000021980",
          "name" : "https://www.suse.com/support/kb/doc/?id=000021980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325",
          "name" : "https://gitlab.isc.org/isc-projects/bind9/-/issues/5325",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/envoyproxy/envoy/issues/40739",
          "name" : "https://github.com/envoyproxy/envoy/issues/40739",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Kong/kong/discussions/14731",
          "name" : "https://github.com/Kong/kong/discussions/14731",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/varnish/hitch/issues/397",
          "name" : "https://github.com/varnish/hitch/issues/397",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://deepness-lab.org/publications/madeyoureset/",
          "name" : "https://deepness-lab.org/publications/madeyoureset/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/",
          "name" : "https://www.imperva.com/blog/madeyoureset-turning-http-2-server-against-itself/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS).  By opening streams and then rapidly triggering the server to reset them—using malformed frames or flow control errors—an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T13:15Z",
    "lastModifiedDate" : "2025-08-17T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48989",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf",
          "name" : "https://lists.apache.org/thread/9ydfg0xr0tchmglcprhxgwhj0hfwxlyf",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Resource Shutdown or Release vulnerability in Apache Tomcat made Tomcat vulnerable to the made you reset attack.\n\nThis issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.9, from 10.1.0-M1 through 10.1.43 and from 9.0.0.M1 through 9.0.107. Older, EOL versions may also be affected.\n\nUsers are recommended to upgrade to one of versions 11.0.10, 10.1.44 or 9.0.108 which fix the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.1.44",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.0.0",
          "versionEndExcluding" : "11.0.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.0.1",
          "versionEndExcluding" : "9.0.108",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T13:15Z",
    "lastModifiedDate" : "2025-08-18T18:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55280",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in ZKTeco WL20 due to storage of Wi-Fi credentials, configuration data and system data in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the plaintext sensitive data stored in the targeted device.  \n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized network access, retrieve and manipulate data on the targeted device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T12:15Z",
    "lastModifiedDate" : "2025-08-13T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55279",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in ZKTeco WL20 due to hard-coded private key stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve private key stored in the firmware of the targeted device.\n\nSuccessful exploitation of this vulnerability could allow the attacker to perform unauthorized decryption of sensitive data and Man-in-the-Middle (MitM) attacks on the targeted device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T12:15Z",
    "lastModifiedDate" : "2025-08-13T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54465",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.zkteco.com/en/Security_Bulletinsibs/20",
          "name" : "https://www.zkteco.com/en/Security_Bulletinsibs/20",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in ZKTeco WL20 due to hard-coded MQTT credentials and endpoints stored in plaintext within the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and analyzing the binary data to retrieve the hard-coded MQTT credentials and endpoints from the targeted device.\n\nSuccessful exploitation of this vulnerability could allow the attacker to gain unauthorized access to the MQTT broker and manipulate the communications of the targeted device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T12:15Z",
    "lastModifiedDate" : "2025-08-13T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54464",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0172",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.zkteco.com/en/Security_Bulletinsibs/20",
          "name" : "https://www.zkteco.com/en/Security_Bulletinsibs/20",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in ZKTeco WL20 due to storage of admin and user credentials without encryption in the device firmware. An attacker with physical access could exploit this vulnerability by extracting the firmware and reverse engineer the binary data to access the unencrypted credentials stored in the firmware of targeted device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T12:15Z",
    "lastModifiedDate" : "2025-08-13T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8916",
        "ASSIGNER" : "feedback-crypto@bouncycastle.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%908916",
          "name" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%908916",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcpkix, bcprov, bcpkix-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files  https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertP... https://github.Com/bcgit/bc-java/blob/main/pkix/src/main/java/org/bouncycastle/pkix/jcajce/PKIXCertPathReviewer.java ,  https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathRevi... https://github.Com/bcgit/bc-java/blob/main/prov/src/main/java/org/bouncycastle/x509/PKIXCertPathReviewer.java .\n\nThis issue affects Bouncy Castle for Java: from BC 1.44 through 1.78, from BCPKIX FIPS 1.0.0 through 1.0.7, from BCPKIX FIPS 2.0.0 through 2.0.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T10:15Z",
    "lastModifiedDate" : "2025-08-13T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8914",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read database contents."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T10:15Z",
    "lastModifiedDate" : "2025-08-13T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8913",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has a Local File Inclusion vulnerability, allowing unauthenticated remote attackers to execute arbitrary code on the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T10:15Z",
    "lastModifiedDate" : "2025-08-13T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8912",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-36"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has an Arbitrary File Reading vulnerability, allowing unauthenticated remote attackers to exploit Absolute Path Traversal to download arbitrary system files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T10:15Z",
    "lastModifiedDate" : "2025-08-13T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8911",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T09:15Z",
    "lastModifiedDate" : "2025-08-13T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8910",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-13T09:15Z",
    "lastModifiedDate" : "2025-08-13T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8909",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-36"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-10325-70192-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-10321-3cae5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Organization Portal System developed by WellChoose has an Arbitrary File Reading vulnerability, allowing remote attackers with regular privileges to exploit Absolute Path Traversal to download arbitrary system files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T09:15Z",
    "lastModifiedDate" : "2025-08-13T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55345",
        "ASSIGNER" : "security@jfrog.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/openai/codex/pull/1705",
          "name" : "https://github.com/openai/codex/pull/1705",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/",
          "name" : "https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/",
          "name" : "https://research.jfrog.com/vulnerabilities/codex-cli-symlink-arbitrary-file-overwrite-jfsa-2025-001378631/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Using Codex CLI in workspace-write mode inside a malicious context (repo, directory, etc) could lead to arbitrary file overwrite and potentially remote code execution due to symlinks being followed outside the allowed current working directory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T09:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8762",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-1263"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "name" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319865",
          "name" : "VDB-319865 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319865",
          "name" : "VDB-319865 | INSTAR 2K+/4K UART improper physical access control",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This issue affects some unknown processing of the component UART Interface. The manipulation leads to improper physical access control. It is possible to launch the attack on the physical device. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T07:15Z",
    "lastModifiedDate" : "2025-08-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8761",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "name" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319864",
          "name" : "VDB-319864 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319864",
          "name" : "VDB-319864 | INSTAR 2K+/4K Backend IPC Server denial of service",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in INSTAR 2K+ and 4K 3.11.1 Build 1124. This vulnerability affects unknown code of the component Backend IPC Server. The manipulation leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T07:15Z",
    "lastModifiedDate" : "2025-08-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8760",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "name" : "https://modzero.com/static/MZ-25-03_modzero_INSTAR.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319863",
          "name" : "VDB-319863 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319863",
          "name" : "VDB-319863 | INSTAR 2K+/4K fcgi_server base64_decode buffer overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in INSTAR 2K+ and 4K 3.11.1 Build 1124. This affects the function base64_decode of the component fcgi_server. The manipulation of the argument Authorization leads to buffer overflow. It is possible to initiate the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T07:15Z",
    "lastModifiedDate" : "2025-08-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6184",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://tutorlms.com/",
          "name" : "https://tutorlms.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/tutor/#developers",
          "name" : "https://wordpress.org/plugins/tutor/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b41d134-be9e-469f-b26b-ac30d95db0a3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b41d134-be9e-469f-b26b-ac30d95db0a3?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Tutor LMS Pro – eLearning and online course solution plugin for WordPress is vulnerable to time-based SQL Injection via the ‘order’ parameter used in the get_submitted_assignments() function in all versions up to, and including, 3.7.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Tutor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. Only the Pro version is affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T07:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6715",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/357aba51-b65e-4691-864b-fef1c78a9362/",
          "name" : "https://wpscan.com/vulnerability/357aba51-b65e-4691-864b-fef1c78a9362/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wpscan.com/vulnerability/357aba51-b65e-4691-864b-fef1c78a9362/",
          "name" : "https://wpscan.com/vulnerability/357aba51-b65e-4691-864b-fef1c78a9362/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The LatePoint  WordPress plugin before 5.1.94 is vulnerable to Local File Inclusion via the layout parameter. This makes it possible for attackers to include and execute PHP files on the server, allowing the execution of any PHP code in those files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T06:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7384",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.1/includes/data.php#L525",
          "name" : "https://plugins.trac.wordpress.org/browser/contact-form-entries/tags/1.4.1/includes/data.php#L525",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3338764/#file9",
          "name" : "https://plugins.trac.wordpress.org/changeset/3338764/#file9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/129f810d-ff83-4428-9f98-6a6aa8817783?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/129f810d-ff83-4428-9f98-6a6aa8817783?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.3 via deserialization of untrusted input in the get_lead_detail function. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain in the Contact Form 7 plugin, which is likely to be used alongside, allows attackers to delete arbitrary files, leading to a denial of service or remote code execution when the wp-config.php file is deleted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-13T05:15Z",
    "lastModifiedDate" : "2025-08-13T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8891",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themes.trac.wordpress.org/changeset/283264/oceanwp/4.1.2/inc/activation-notice/api.php",
          "name" : "https://themes.trac.wordpress.org/changeset/283264/oceanwp/4.1.2/inc/activation-notice/api.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9c6f9a3d-54a6-4405-b42b-37fc8342af96?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9c6f9a3d-54a6-4405-b42b-37fc8342af96?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The OceanWP theme for WordPress is vulnerable to Cross-Site Request Forgery in versions 4.0.9 to 4.1.1. This is due to missing or incorrect nonce validation on the oceanwp_notice_button_click() function. This makes it possible for unauthenticated attackers to install the Ocean Extra plugin via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T04:16Z",
    "lastModifiedDate" : "2025-08-13T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8491",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/easy-pdf-restaurant-menu-upload/tags/2.0.2/class/class-admin-settings-nsc_eprm.php#L95",
          "name" : "https://plugins.trac.wordpress.org/browser/easy-pdf-restaurant-menu-upload/tags/2.0.2/class/class-admin-settings-nsc_eprm.php#L95",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3338246/easy-pdf-restaurant-menu-upload/trunk/class/class_admin_easy_pdf_restaurant_menu.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3338246/easy-pdf-restaurant-menu-upload/trunk/class/class_admin_easy_pdf_restaurant_menu.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a349b220-5b42-4b98-869f-ce8399fe7ec9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a349b220-5b42-4b98-869f-ce8399fe7ec9?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Easy restaurant menu manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0.2. This is due to missing or incorrect nonce validation on the nsc_eprm_save_menu() function. This makes it possible for unauthenticated attackers to upload a menu file via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-13T04:16Z",
    "lastModifiedDate" : "2025-08-13T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0818",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Studio-42/elFinder",
          "name" : "https://github.com/Studio-42/elFinder",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Studio-42/elFinder/blob/master/php/elFinder.class.php#L5367",
          "name" : "https://github.com/Studio-42/elFinder/blob/master/php/elFinder.class.php#L5367",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/library/php/elFinder.class.php#L5411",
          "name" : "https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/library/php/elFinder.class.php#L5411",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/lib/php/elFinder.class.php#L5378",
          "name" : "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/lib/php/elFinder.class.php#L5378",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/lib/php/elFinder.class.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/lib/php/elFinder.class.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3319016/filester",
          "name" : "https://plugins.trac.wordpress.org/changeset/3319016/filester",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3335715/file-manager-advanced/trunk/application/library/php/elFinder.class.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3335715/file-manager-advanced/trunk/application/library/php/elFinder.class.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a166de-3bdf-4883-91ba-655f2757c53b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a166de-3bdf-4883-91ba-655f2757c53b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-08-13T04:16Z",
    "lastModifiedDate" : "2025-08-13T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8901",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/435139154",
          "name" : "https://issues.chromium.org/issues/435139154",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds write in ANGLE in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "139.0.7258.127",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8882",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/435623339",
          "name" : "https://issues.chromium.org/issues/435623339",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Aura in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "139.0.7258.127",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8881",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/433800617",
          "name" : "https://issues.chromium.org/issues/433800617",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in File Picker in Google Chrome prior to 139.0.7258.127 allowed a remote attacker who convinced a user to engage in specific UI gestures to leak cross-origin data via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "139.0.7258.127",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8880",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/433533359",
          "name" : "https://issues.chromium.org/issues/433533359",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race in V8 in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "139.0.7258.127",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8879",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/08/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/432035817",
          "name" : "https://issues.chromium.org/issues/432035817",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap buffer overflow in libaom in Google Chrome prior to 139.0.7258.127 allowed a remote attacker to potentially exploit heap corruption via a curated set of gestures. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "139.0.7258.127",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4410",
        "ASSIGNER" : "security.report@insyde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "name" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer overflow vulnerability exists in the module SetupUtility. An attacker with local privileged access can exploit this vulnerability by executeing arbitrary code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T03:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4277",
        "ASSIGNER" : "security.report@insyde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "name" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tcg2Smm has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T02:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4276",
        "ASSIGNER" : "security.report@insyde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "name" : "https://www.insyde.com/security-pledge/sa-2025005/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "UsbCoreDxe has a vulnerability which can be used to write arbitrary memory inside SMRAM and execute arbitrary code at SMM level."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-13T02:15Z",
    "lastModifiedDate" : "2025-08-13T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8395",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-12T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54238",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/dimension/apsb25-84.html",
          "name" : "https://helpx.adobe.com/security/products/dimension/apsb25-84.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dimension versions 4.1.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:dimension:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "4.1.4",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54233",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "name" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2020.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022",
            "versionEndExcluding" : "2022.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54232",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "name" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2020.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022",
            "versionEndExcluding" : "2022.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54231",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "name" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2020.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022",
            "versionEndExcluding" : "2022.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54230",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "name" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2020.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022",
            "versionEndExcluding" : "2022.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54229",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "name" : "https://helpx.adobe.com/security/products/framemaker/apsb25-83.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2020.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022",
            "versionEndExcluding" : "2022.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-14T01:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49457",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25030",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25030",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted search path in certain Zoom Clients for Windows may allow an unauthenticated user to conduct an escalation of privilege via network access"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-12T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49456",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25029",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25029",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race condition in the installer for certain Zoom Clients for Windows may allow an unauthenticated user to impact  application integrity via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T23:15Z",
    "lastModifiedDate" : "2025-08-12T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54222",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-81.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Stager versions 3.1.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_stager:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "3.1.4",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T22:15Z",
    "lastModifiedDate" : "2025-08-14T01:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55171",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/aa63f499a285bf91795b9836eec0425e7eafe570",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/aa63f499a285bf91795b9836eec0425e7eafe570",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/109",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/109",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8rm5-3jvx-hcxv",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-8rm5-3jvx-hcxv",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, the application does not check authentication at endpoint /html/personalizacao_remover.php allowing anonymous attacker (without login) to delete any Image files at endpoint /html/personalizacao_remover.php by defining imagem_0 as image id to delete. This issue has been patched in version 3.4.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55170",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/c2bd4121a2b2a076c9f2ef0bdbb46231389993c8",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/c2bd4121a2b2a076c9f2ef0bdbb46231389993c8",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/141",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/141",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-77hc-c8f4-p3hc",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-77hc-c8f4-p3hc",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a reflected cross-site scripting (XSS) vulnerability was identified in the /html/alterar_senha.php endpoint of the WeGIA application. This vulnerability allows attackers to inject malicious scripts in the verificacao and redir_config parameter. This issue has been patched in version 3.4.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55165",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/gelbphoenix/autocaliweb/commit/f455051f7c758ae8490186718b73e449f353b702",
          "name" : "https://github.com/gelbphoenix/autocaliweb/commit/f455051f7c758ae8490186718b73e449f353b702",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/gelbphoenix/autocaliweb/releases/tag/v0.8.3",
          "name" : "https://github.com/gelbphoenix/autocaliweb/releases/tag/v0.8.3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535",
          "name" : "https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535",
          "name" : "https://github.com/gelbphoenix/autocaliweb/security/advisories/GHSA-44vp-wgh9-9535",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Autocaliweb is a web app that offers an interface for browsing, reading, and downloading eBooks using a valid Calibre database. Prior to version 0.8.3, the debug pack generated by Autocaliweb can expose sensitive configuration data, including API keys. This occurs because the to_dict() method, used to serialize configuration for the debug pack, doesn't adequately filter out sensitive fields such as API tokens. Users, unaware of the full contents, might share these debug packs, inadvertently leaking their private API keys. This issue has been patched in version 0.8.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54235",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54228",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54227",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54226",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54225",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54224",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54223",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54221",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54220",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54219",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54218",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54217",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54216",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54215",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "name" : "https://helpx.adobe.com/security/products/incopy/apsb25-80.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InCopy versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:incopy:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54214",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54213",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54212",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54211",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54210",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54209",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54208",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54207",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-824"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54206",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "name" : "https://helpx.adobe.com/security/products/indesign/apsb25-79.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "InDesign Desktop versions 20.4, 19.5.4 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "19.5.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:indesign:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "20.0",
            "versionEndExcluding" : "20.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54205",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-78.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-sampler/apsb25-78.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Sampler versions 5.0.3 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_sampler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54204",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54203",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54202",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54201",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54200",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54199",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54198",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54197",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54195",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54194",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54193",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54192",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54191",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54190",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54189",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54188",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory.  Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54187",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d_painter/apsb25-77.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Painter versions 11.0.2 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_painter:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54186",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49573",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49572",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49571",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-modeler/apsb25-76.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Modeler versions 1.22.0 and earlier are affected by an Uncontrolled Search Path Element vulnerability that could result in arbitrary code execution in the context of the current user. If the application uses an uncontrolled search path to locate critical resources such as programs, an attacker could modify that search path to point to a malicious program, which the targeted application would then execute. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_modeler:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-13T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49570",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/photoshop/apsb25-75.html",
          "name" : "https://helpx.adobe.com/security/products/photoshop/apsb25-75.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Photoshop Desktop versions 25.12.3, 26.8 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "25.0",
            "versionEndExcluding" : "25.12.4",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:photoshop:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "26.0",
            "versionEndExcluding" : "26.9",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49562",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/animate/apsb25-73.html",
          "name" : "https://helpx.adobe.com/security/products/animate/apsb25-73.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Animate versions 23.0.12, 24.0.9 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "23.0.0",
            "versionEndExcluding" : "23.0.13",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "24.0.0",
            "versionEndExcluding" : "24.0.10",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49561",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/animate/apsb25-73.html",
          "name" : "https://helpx.adobe.com/security/products/animate/apsb25-73.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Animate versions 23.0.12, 24.0.9 and earlier are affected by a Use After Free vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "23.0.0",
            "versionEndExcluding" : "23.0.13",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:animate:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "24.0.0",
            "versionEndExcluding" : "24.0.10",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49569",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Viewer versions 0.25 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_viewer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.25.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T20:15Z",
    "lastModifiedDate" : "2025-08-14T01:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49560",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html",
          "name" : "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-72.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Substance3D - Viewer versions 0.25 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:substance_3d_viewer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.25.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T20:15Z",
    "lastModifiedDate" : "2025-08-14T01:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36000",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242026",
          "name" : "https://www.ibm.com/support/pages/node/7242026",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM WebSphere Application Server Liberty 17.0.0.3 through 25.0.0.8 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
          "versionStartIncluding" : "17.0.0.3",
          "versionEndExcluding" : "25.0.0.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T20:15Z",
    "lastModifiedDate" : "2025-08-14T01:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55169",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/e8476168171de2f3e047ed92bbc264c981b416b1",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/e8476168171de2f3e047ed92bbc264c981b416b1",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/177",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/177",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Mitigation" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mm3p-7573-4x4j",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-mm3p-7573-4x4j",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a path traversal vulnerability was discovered in the WeGIA application, html/socio/sistema/download_remessa.php endpoint. This vulnerability could allow an attacker to gain unauthorized access to local files in the server and sensitive information stored in config.php. config.php contains information that could allow direct access to the database. This issue has been patched in version 3.4.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55168",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/766f9f07ff6faee394e0f85d0650f86f8a9248a7https://github.com/LabRedesCefetRJ/WeGIA/commit/766f9f07ff6faee394e0f85d0650f86f8a9248a7",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/766f9f07ff6faee394e0f85d0650f86f8a9248a7https://github.com/LabRedesCefetRJ/WeGIA/commit/766f9f07ff6faee394e0f85d0650f86f8a9248a7",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/245",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/issues/245",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Mitigation" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6wjm-c879-pjf6",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-6wjm-c879-pjf6",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a SQL Injection vulnerability was identified in the /html/saude/aplicar_medicamento.php endpoint, specifically in the id_fichamedica parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue has been patched in version 3.4.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53744",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-173",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-173",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege assignment vulnerability [CWE-266] in FortiOS Security Fabric version 7.6.0 through 7.6.2, 7.4.0 through 7.4.7, 7.2 all versions, 7.0 all versions, 6.4 all versions, may allow a remote authenticated attacker with high privileges to escalate their privileges to super-admin via registering the device to a malicious FortiManager."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T12:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52970",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-448",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-448",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://pwner.gg/blog/2025-08-13-fortiweb-cve-2025-52970",
          "name" : "https://pwner.gg/blog/2025-08-13-fortiweb-cve-2025-52970",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A improper handling of parameters in Fortinet FortiWeb versions 7.6.3 and below, versions 7.4.7 and below, versions 7.2.10 and below, and 7.0.10 and below may allow an unauthenticated remote attacker with non-public information pertaining to the device and targeted user to gain admin privileges on the device via a specially crafted request."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T12:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49813",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-501",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-501",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper neutralization of special elements used in an OS Command (\"OS Command Injection\") vulnerability [CWE-78] in Fortinet FortiADC version 7.2.0 and before 7.1.1 allows a remote and authenticated attacker with low privilege to execute unauthorized code via specifically crafted HTTP parameters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0",
          "versionEndExcluding" : "7.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiadc:7.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.2.0",
          "versionEndIncluding" : "6.2.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T12:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47857",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-253",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-253",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A improper neutralization of special elements used in an os command ('os command injection') vulnerability [CWE-78] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or command via crafted CLI commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.1",
          "versionEndExcluding" : "7.4.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T12:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43734",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43734",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43734",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.10, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.1 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allows a remote authenticated attacker to inject JavaScript code in the “first display label” field in the configuration of a custom sort widget. This malicious payload is then reflected and executed by clay button taglib when refreshing the page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36124",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-268"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242027",
          "name" : "https://www.ibm.com/support/pages/node/7242027",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM WebSphere Application Server Liberty 17.0.0.3 through 25.0.0.8 could allow a remote attacker to bypass security restrictions caused by a failure to honor JMS messaging configuration"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
          "versionStartIncluding" : "17.0.0.3",
          "versionEndExcluding" : "25.0.0.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32932",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-513",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-513",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper neutralization of input during web page generation ('cross-site scripting') vulnerability [CWE-79] in FortiSOAR version 7.6.1 and below, version 7.5.1 and below, 7.4 all versions, 7.3 all versions, 7.2 all versions, 7.0 all versions, 6.4 all versions WEB UI may allow an authenticated remote attacker to perform an XSS attack via stored malicious service requests"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.5.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T12:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32766",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-383",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-383",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stack-based buffer overflow vulnerability [CWE-121] in Fortinet FortiWeb CLI version 7.6.0 through 7.6.3 and before 7.4.8 allows a privileged attacker to execute arbitrary code or commands via crafted CLI commands"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.1",
          "versionEndExcluding" : "7.4.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27759",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-150",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-150",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiWeb version 7.6.0 through 7.6.3, 7.4.0 through 7.4.7, 7.2.0 through 7.2.10 and before 7.0.10 allows an authenticated privileged attacker to execute unauthorized code or commands via crafted CLI commands"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25256",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-152",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-25-152",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256",
          "name" : "https://github.com/watchtowrlabs/watchTowr-vs-FortiSIEM-CVE-2025-25256",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256/",
          "name" : "https://labs.watchtowr.com/should-security-solutions-be-secure-maybe-were-all-wrong-fortinet-fortisiem-pre-auth-command-injection-cve-2025-25256/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.theregister.com/2025/08/13/fortinet_discloses_critical_bug/",
          "name" : "https://www.theregister.com/2025/08/13/fortinet_discloses_critical_bug/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper neutralization of special elements used in an OS command ('OS Command Injection') vulnerability [CWE-78] in Fortinet FortiSIEM version 7.3.0 through 7.3.1, 7.2.0 through 7.2.5, 7.1.0 through 7.1.7, 7.0.0 through 7.0.3 and before 6.7.9 allows an unauthenticated attacker to execute unauthorized code or commands via crafted CLI requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.4.0",
          "versionEndExcluding" : "6.7.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0",
          "versionEndExcluding" : "7.1.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisiem:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0",
          "versionEndExcluding" : "7.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-15T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25248",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-364",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-364",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Integer Overflow or Wraparound vulnerability [CWE-190] in FortiOS version 7.6.2 and below, version 7.4.7 and below, version 7.2.10 and below, 7.2 all versions, 6.4 all versions, FortiProxy version 7.6.2 and below, version 7.4.3 and below, 7.2 all versions, 7.0 all versions, 2.0 all versions and FortiPAM version 1.5.0, version 1.4.2 and below, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions SSL-VPN RDP and VNC bookmarks may allow an authenticated user to affect the device SSL-VPN availability via crafted requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.2.11",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndExcluding" : "1.4.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortipam:1.5.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2.0.0",
          "versionEndExcluding" : "7.4.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52964",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-473",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-473",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in Fortinet FortiManager version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5, 7.2.0 through 7.2.9 and below 7.0.13 & FortiManager Cloud version 7.6.0 through 7.6.1, 7.4.0 through 7.4.5 and before 7.2.9 allows an authenticated remote attacker to overwrite arbitrary files via FGFM crafted requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.2.0",
          "versionEndExcluding" : "7.0.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.10",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.1",
          "versionEndExcluding" : "7.4.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.1",
          "versionEndIncluding" : "7.0.13",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimanager_cloud:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.1",
          "versionEndExcluding" : "7.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-48892",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-421",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-421",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A relative path traversal vulnerability [CWE-23] in FortiSOAR 7.6.0, 7.5.0 through 7.5.1, 7.4 all versions, 7.3 all versions may allow an authenticated attacker to read arbitrary files via uploading a malicious solution pack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisoar:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0",
          "versionEndExcluding" : "7.5.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortisoar:7.6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-40588",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-309",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-309",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple relative path traversal vulnerabilities [CWE-23] in Fortinet FortiMail version 7.6.0 through 7.6.1 and before 7.4.3, FortiVoice version 7.0.0 through 7.0.5 and before 7.4.9, FortiRecorder version 7.2.0 through 7.2.1 and before 7.0.4, FortiCamera  & FortiNDR version 7.6.0 and before 7.4.6 may allow a privileged attacker to read files from the underlying filesystem via crafted CLI requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:fortinet:forticamera_firmware:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2.0.0",
            "versionEndIncluding" : "2.1.4",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:fortinet:forticamera:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.4.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortindr:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.6.0",
          "versionEndExcluding" : "7.6.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortirecorder:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.0.5",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortivoice:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.4.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-26009",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-042",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-24-042",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authentication bypass using an alternate path or channel [CWE-288] vulnerability in Fortinet FortiOS version 6.4.0 through 6.4.15\tand before 6.2.16, FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8 and before 7.0.15 & FortiPAM before version 1.2.0 allows an unauthenticated attacker to seize control of a managed device via crafted FGFM requests, if the device is managed by a FortiManager, and if the attacker knows that FortiManager's serial number."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiswitchmanager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.16",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndIncluding" : "1.2.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "6.4.16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.2.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-45584",
        "ASSIGNER" : "psirt@fortinet.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-415"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://fortiguard.fortinet.com/psirt/FG-IR-23-209",
          "name" : "https://fortiguard.fortinet.com/psirt/FG-IR-23-209",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A double free vulnerability [CWE-415] in Fortinet FortiOS version 7.4.0, version 7.2.0 through 7.2.5 and before 7.0.12, FortiProxy version 7.4.0 through 7.4.1, version 7.2.0 through 7.2.7 and before 7.0.13 and FortiPAM version 1.1.0 through 1.1.2 and before 1.0.3 allows a privileged attacker to execute code or commands via crafted HTTP or HTTPs requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:7.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.4.0",
          "versionEndExcluding" : "7.0.13",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:fortinet:fortipam:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndIncluding" : "1.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0",
          "versionEndExcluding" : "7.2.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53793",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53793",
          "name" : "Azure Stack Hub Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authentication in Azure Stack allows an unauthorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.2406.0.8",
          "versionEndExcluding" : "1.2406.1.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.2408.0.19",
          "versionEndExcluding" : "1.2408.1.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.2501.0.21",
          "versionEndExcluding" : "1.2501.1.47",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53789",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53789",
          "name" : "Windows StateRepository API Server file Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing authentication for critical function in Windows StateRepository API allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4652",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5624",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4652",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21073",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21073",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6093",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6093",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "10.0.22631.5624",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3932",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1732",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53788",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53788",
          "name" : "Windows Subsystem for Linux (WSL2) Kernel Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check time-of-use (toctou) race condition in Windows Subsystem for Linux allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:windows_subsystem_for_linux:*:*:*:*:*:-:*:*",
          "versionEndExcluding" : "2.5.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53784",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53784",
          "name" : "Microsoft Word Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53783",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53783",
          "name" : "Microsoft Teams Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Microsoft Teams allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53781",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53781",
          "name" : "Azure Virtual Machines Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Azure Virtual Machines allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53779",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53779",
          "name" : "Windows Kerberos Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Relative path traversal in Windows Kerberos allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53778",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53778",
          "name" : "Windows NTLM Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authentication in Windows NTLM allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53773",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53773",
          "name" : "GitHub Copilot and Visual Studio Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://news.ycombinator.com/item?id=44883108",
          "name" : "https://news.ycombinator.com/item?id=44883108",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/",
          "name" : "https://embracethered.com/blog/posts/2025/github-copilot-remote-code-execution-via-prompt-injection/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of special elements used in a command ('command injection') in GitHub Copilot and Visual Studio allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:visual_studio_2022:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "17.14.0",
          "versionEndExcluding" : "17.14.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53772",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53772",
          "name" : "Web Deploy Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of untrusted data in Web Deploy allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:web_deploy_4.0:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.2001",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53769",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53769",
          "name" : "Windows Security App Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "External control of file name or path in Windows Security App allows an authorized attacker to perform spoofing locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:windows_security_app:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1000.27840.0.1000",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53766",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53766",
          "name" : "GDI+ Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows GDI+ allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "16.0.19127.20000",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:*:*:*:*:*:universal:*:*",
          "versionEndExcluding" : "16.0.14326.22618",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53765",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-359"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53765",
          "name" : "Azure Stack Hub Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of private personal information to an unauthorized actor in Azure Stack allows an authorized attacker to disclose information locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:microsoft:azure_app_service_on_azure_stack:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "102.10.2.11",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:microsoft:azure_stack_hub:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.2311.1.22",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53761",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53761",
          "name" : "Microsoft PowerPoint Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office PowerPoint allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:powerpoint:2016:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53760",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53760",
          "name" : "Microsoft SharePoint Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-side request forgery (ssrf) in Microsoft Office SharePoint allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*",
          "versionEndExcluding" : "16.0.18526.20518",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53759",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53759",
          "name" : "Microsoft Excel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53741",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53741",
          "name" : "Microsoft Excel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53740",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53740",
          "name" : "Microsoft Office Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53739",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53739",
          "name" : "Microsoft Excel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53738",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53738",
          "name" : "Microsoft Word Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office Word allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T15:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53737",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53737",
          "name" : "Microsoft Excel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53736",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-126"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53736",
          "name" : "Microsoft Word Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Buffer over-read in Microsoft Office Word allows an unauthorized attacker to disclose information locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53735",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53735",
          "name" : "Microsoft Excel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office Excel allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_online_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:excel:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53734",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53734",
          "name" : "Microsoft Office Visio Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53733",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-681"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53733",
          "name" : "Microsoft Word Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect conversion between numeric types in Microsoft Office Word allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_enterprise_server:2016:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:word:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53732",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53732",
          "name" : "Microsoft Office Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Microsoft Office allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "16.0.19127.20000",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:*:*:*:*:*:universal:*:*",
          "versionEndExcluding" : "16.0.14326.22618",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53731",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53731",
          "name" : "Microsoft Office Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2016:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:macos:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53730",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53730",
          "name" : "Microsoft Office Visio Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Office Visio allows an unauthorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_apps:-:*:*:*:enterprise:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office:2019:*:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2021:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:office_long_term_servicing_channel:2024:*:*:*:*:-:x86:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53729",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53729",
          "name" : "Microsoft Azure File Sync Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in Azure File Sync allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "18.0.0.0",
          "versionEndExcluding" : "18.3.0.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "19.0.0.0",
          "versionEndExcluding" : "19.2.0.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "20.0.0.0",
          "versionEndExcluding" : "20.1.0.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_file_sync:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "21.0.0.0",
          "versionEndIncluding" : "21.1.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53728",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53728",
          "name" : "Microsoft Dynamics 365 (On-Premises) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*",
          "versionStartIncluding" : "9.1",
          "versionEndExcluding" : "9.1.39.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53727",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53727",
          "name" : "Microsoft SQL Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.6300.2",
          "versionEndExcluding" : "13.0.6465.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.7000.253",
          "versionEndExcluding" : "13.0.7060.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.1000.169",
          "versionEndExcluding" : "14.0.2080.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.3006.16",
          "versionEndExcluding" : "14.0.3500.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.2000.5",
          "versionEndExcluding" : "15.0.2140.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.4003.23",
          "versionEndExcluding" : "15.0.4440.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.1000.6",
          "versionEndExcluding" : "16.0.1145.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.4003.1",
          "versionEndExcluding" : "16.0.4210.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T01:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53726",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53726",
          "name" : "Windows Push Notifications Apps Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53725",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53725",
          "name" : "Windows Push Notifications Apps Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53724",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53724",
          "name" : "Windows Push Notifications Apps Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53723",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          }, {
            "lang" : "en",
            "value" : "CWE-197"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53723",
          "name" : "Windows Hyper-V Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Numeric truncation error in Windows Hyper-V allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53722",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53722",
          "name" : "Windows Remote Desktop Services Denial of Service Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption in Windows Remote Desktop Services allows an unauthorized attacker to deny service over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53721",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53721",
          "name" : "Windows Connected Devices Platform Service Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Connected Devices Platform Service allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53720",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53720",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53719",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53719",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53718",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53718",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53716",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53716",
          "name" : "Local Security Authority Subsystem Service (LSASS) Denial of Service Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Null pointer dereference in Windows Local Security Authority Subsystem Service (LSASS) allows an authorized attacker to deny service over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53156",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53156",
          "name" : "Windows Storage Port Driver Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Storage Port Driver allows an authorized attacker to disclose information locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53155",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53155",
          "name" : "Windows Hyper-V Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Hyper-V allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53154",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53154",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53153",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53153",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53152",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53152",
          "name" : "Desktop Windows Manager Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Desktop Windows Manager allows an authorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53151",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53151",
          "name" : "Windows Kernel Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53149",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53149",
          "name" : "Kernel Streaming WOW Thunk Service Driver Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Kernel Streaming WOW Thunk Service Driver allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53148",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53148",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53147",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53147",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53145",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53145",
          "name" : "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53144",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53144",
          "name" : "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53143",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53143",
          "name" : "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Message Queuing allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T16:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53142",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53142",
          "name" : "Microsoft Brokering File System Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Microsoft Brokering File System allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53141",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53141",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Null pointer dereference in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53140",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53140",
          "name" : "Windows Kernel Transaction Manager Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Kernel Transaction Manager allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-18T17:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53138",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53138",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53137",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53137",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53136",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53136",
          "name" : "NT OS Kernel Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Windows NT OS Kernel allows an authorized attacker to disclose information locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53135",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53135",
          "name" : "DirectX Graphics Kernel Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows DirectX allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53134",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53134",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53133",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53133",
          "name" : "Windows PrintWorkflowUserSvc Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows PrintWorkflowUserSvc allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53132",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53132",
          "name" : "Win32k Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Win32K - GRFX allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53131",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53131",
          "name" : "Windows Media Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Media allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50177",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50177",
          "name" : "Microsoft Message Queuing (MSMQ) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Message Queuing allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50176",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          }, {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50176",
          "name" : "DirectX Graphics Kernel Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Graphics Kernel allows an authorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50173",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50173",
          "name" : "Windows Installer Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Weak authentication in Windows Installer allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50172",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50172",
          "name" : "DirectX Graphics Kernel Denial of Service Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allocation of resources without limits or throttling in Windows DirectX allows an authorized attacker to deny service over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50171",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50171",
          "name" : "Remote Desktop Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing authorization in Remote Desktop Server allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50170",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-280"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50170",
          "name" : "Windows Cloud Files Mini Filter Driver Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper handling of insufficient permissions or privileges in Windows Cloud Files Mini Filter Driver allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50169",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          }, {
            "lang" : "en",
            "value" : "CWE-415"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50169",
          "name" : "Windows SMB Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows SMB allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50168",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          }, {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50168",
          "name" : "Win32k Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Win32K - ICOMP allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50167",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50167",
          "name" : "Windows Hyper-V Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Hyper-V allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50166",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50166",
          "name" : "Windows Distributed Transaction Coordinator (MSDTC) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Integer overflow or wraparound in Windows Distributed Transaction Coordinator allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50165",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-822"
          }, {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50165",
          "name" : "Windows Graphics Component Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted pointer dereference in Microsoft Graphics Component allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50164",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50164",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50163",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50163",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50162",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50162",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50161",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50161",
          "name" : "Win32k Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Win32K - GRFX allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50160",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50160",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50159",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50159",
          "name" : "Remote Access Point-to-Point Protocol (PPP) EAP-TLS Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Remote Access Point-to-Point Protocol (PPP) EAP-TLS allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50158",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50158",
          "name" : "Windows NTFS Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check time-of-use (toctou) race condition in Windows NTFS allows an unauthorized attacker to disclose information locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50157",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50157",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50156",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50156",
          "name" : "Windows Routing and Remote Access Service (RRAS) Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use of uninitialized resource in Windows Routing and Remote Access Service (RRAS) allows an authorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50155",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          }, {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50155",
          "name" : "Windows Push Notifications Apps Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access of resource using incompatible type ('type confusion') in Windows Push Notifications allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50154",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50154",
          "name" : "Microsoft Windows File Explorer Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Windows File Explorer allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50153",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-50153",
          "name" : "Desktop Windows Manager Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Desktop Windows Manager allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49762",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49762",
          "name" : "Windows Ancillary Function Driver for WinSock Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Windows Ancillary Function Driver for WinSock allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49761",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49761",
          "name" : "Windows Kernel Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Windows Kernel allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49759",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49759",
          "name" : "Microsoft SQL Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.6300.2",
          "versionEndExcluding" : "13.0.6465.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.7000.253",
          "versionEndExcluding" : "13.0.7060.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.1000.169",
          "versionEndExcluding" : "14.0.2080.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.3006.16",
          "versionEndExcluding" : "14.0.3500.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.2000.5",
          "versionEndExcluding" : "15.0.2140.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.4003.23",
          "versionEndExcluding" : "15.0.4440.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.1000.6",
          "versionEndExcluding" : "16.0.1145.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.4003.1",
          "versionEndExcluding" : "16.0.4210.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T01:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49758",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49758",
          "name" : "Microsoft SQL Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.6300.2",
          "versionEndExcluding" : "13.0.6465.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.7000.253",
          "versionEndExcluding" : "13.0.7060.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.1000.169",
          "versionEndExcluding" : "14.0.2080.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.3006.16",
          "versionEndExcluding" : "14.0.3500.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.2000.5",
          "versionEndExcluding" : "15.0.2140.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.4003.23",
          "versionEndExcluding" : "15.0.4440.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.1000.6",
          "versionEndExcluding" : "16.0.1145.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.4003.1",
          "versionEndExcluding" : "16.0.4210.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T01:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49757",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49757",
          "name" : "Windows Routing and Remote Access Service (RRAS) Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based buffer overflow in Windows Routing and Remote Access Service (RRAS) allows an unauthorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4652",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3932",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1732",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49755",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-451"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49755",
          "name" : "Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "User interface (ui) misrepresentation of critical information in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "139.0.3405.86",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49751",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-820"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49751",
          "name" : "Windows Hyper-V Denial of Service Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing synchronization in Windows Hyper-V allows an authorized attacker to deny service over an adjacent network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49745",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49745",
          "name" : "Microsoft Dynamics 365 (on-premises) Cross-site Scripting Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of input during web page generation ('cross-site scripting') in Microsoft Dynamics 365 (on-premises) allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:dynamics_365:*:*:*:*:on-premises:*:*:*",
          "versionStartIncluding" : "9.1",
          "versionEndExcluding" : "9.1.38.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49743",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          }, {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49743",
          "name" : "Windows Graphics Component Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent execution using shared resource with improper synchronization ('race condition') in Microsoft Graphics Component allows an authorized attacker to elevate privileges locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.10240.21100",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19044.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.19045.6216",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5768",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8330",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4851",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7678",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3989",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1791",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49736",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-449"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49736",
          "name" : "Microsoft Edge (Chromium-based) for Android Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ui performs the wrong action in Microsoft Edge for Android allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:edge:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "139.0.3405.86",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49712",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49712",
          "name" : "Microsoft SharePoint Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deserialization of untrusted data in Microsoft Office SharePoint allows an authorized attacker to execute code over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49707",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49707",
          "name" : "Azure Virtual Machines Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in Azure Virtual Machines allows an authorized attacker to perform spoofing locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.9,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.5,
        "impactScore" : 5.8
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49559",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by an Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to modify limited data. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49558",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by a Time-of-check Time-of-use (TOCTOU) Race Condition vulnerability that could result in a security feature bypass. An attacker could exploit this vulnerability by manipulating the timing between the check of a resource's state and its use, allowing unauthorized write access. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49557",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be exploited by a low-privileged attacker to inject malicious scripts into vulnerable form fields. These scripts may be used to escalate privileges within the application or compromise sensitive user data. Exploitation of this issue requires user interaction in that a victim must browse to the page containing the vulnerable field. Scope is changed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49556",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by an Incorrect Authorization vulnerability that could result in a security feature bypass. An attacker could leverage this vulnerability to bypass security measures and gain unauthorized read access. Exploitation of this issue does not require user interaction, and scope is unchanged."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49555",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by a Cross-Site Request Forgery (CSRF) vulnerability that could result in privilege escalation. A high-privileged attacker could trick a victim into executing unintended actions on a web application where the victim is authenticated, potentially allowing unauthorized access or modification of sensitive data. Exploitation of this issue requires user interaction in that a victim must visit a malicious website or click on a crafted link. Scope is changed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 5.8
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49554",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "name" : "https://helpx.adobe.com/security/products/magento/apsb25-71.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Commerce versions 2.4.9-alpha1, 2.4.8-p1, 2.4.7-p6, 2.4.6-p11, 2.4.5-p13, 2.4.4-p14 and earlier are affected by an Improper Input Validation vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability by providing specially crafted input, causing the application to crash or become unresponsive. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:b2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:beta3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:beta1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.4:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.5:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.6:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.7:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:2.4.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "2.4.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.3:p14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.4:p13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.3.5:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.4.2:p6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.2:p1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:1.5.3:alpha1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:commerce_b2b:*:-:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:b2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.9:alpha1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p12:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p13:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.5:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p10:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p11:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p7:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p8:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.6:p9:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:beta3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p3:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p4:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p5:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.7:p6:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:-:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:beta2:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:2.4.8:p1:*:*:open_source:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:magento:*:-:*:*:open_source:*:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T15:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48807",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-923"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-48807",
          "name" : "Windows Hyper-V Remote Code Execution Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper restriction of communication channel to intended endpoints in Windows Hyper-V allows an authorized attacker to execute code locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4652",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22621.5624",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.22631.5624",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.26100.4652",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19045.6093",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.14393.8246",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.17763.7558",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.20348.3932",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.0.25398.1732",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "10.0.19044.6093",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-15T17:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47954",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47954",
          "name" : "Microsoft SQL Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of special elements used in an sql command ('sql injection') in SQL Server allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.1000.6",
          "versionEndExcluding" : "16.0.1145.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.4003.1",
          "versionEndExcluding" : "16.0.4210.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T01:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33051",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-33051",
          "name" : "Microsoft Exchange Server Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor in Microsoft Exchange Server allows an unauthorized attacker to disclose information over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25007",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1286"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25007",
          "name" : "Microsoft Exchange Server Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper validation of syntactic correctness of input in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25006",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-167"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25006",
          "name" : "Microsoft Exchange Server Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper handling of additional special element in Microsoft Exchange Server allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25005",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-25005",
          "name" : "Microsoft Exchange Server Tampering Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in Microsoft Exchange Server allows an authorized attacker to perform tampering over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24999",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24999",
          "name" : "Microsoft SQL Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in SQL Server allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.6300.2",
          "versionEndExcluding" : "13.0.6465.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2016:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "13.0.7000.253",
          "versionEndExcluding" : "13.0.7060.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.1000.169",
          "versionEndExcluding" : "14.0.2080.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2017:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "14.0.3006.16",
          "versionEndExcluding" : "14.0.3500.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.2000.5",
          "versionEndExcluding" : "15.0.2140.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2019:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "15.0.4003.23",
          "versionEndExcluding" : "15.0.4440.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.1000.6",
          "versionEndExcluding" : "16.0.1145.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sql_server_2022:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "16.0.4003.1",
          "versionEndExcluding" : "16.0.4210.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-14T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20044",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-667"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper locking for some Intel(R) TDX Module firmware before version 1.5.13 may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55167",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/cb7f5e2b98ef6087b80659627f368612e3c535f3",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/commit/cb7f5e2b98ef6087b80659627f368612e3c535f3",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4fqm-ww3v-6mwv",
          "name" : "https://github.com/LabRedesCefetRJ/WeGIA/security/advisories/GHSA-4fqm-ww3v-6mwv",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WeGIA is an open source web manager with a focus on the Portuguese language and charitable institutions. Prior to version 3.4.8, a SQL Injection vulnerability was identified in the /html/funcionario/dependente_remover.php endpoint, specifically in the id_dependente parameter. This vulnerability allows attackers to execute arbitrary SQL commands, compromising the confidentiality, integrity, and availability of the database. This issue has been patched in version 3.4.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wegia:wegia:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-18T15:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55166",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/darylldoyle/svg-sanitizer/commit/5a0a1eaf0c6b0b540dc945fe30c93cf106b357c1",
          "name" : "https://github.com/darylldoyle/svg-sanitizer/commit/5a0a1eaf0c6b0b540dc945fe30c93cf106b357c1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-22wq-q86m-83fh",
          "name" : "https://github.com/darylldoyle/svg-sanitizer/security/advisories/GHSA-22wq-q86m-83fh",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "savg-sanitizer is a PHP SVG/XML sanitizer. Prior to version 0.22.0, the sanitization logic in the cleanXlinkHrefs method only searches for lower-case attribute name, which allows to by-pass the isHrefSafeValue check. As a result this allows cross-site scripting or linking to external domains. This issue has been patched in version 0.22.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49568",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "name" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a Use After Free vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "28.0",
            "versionEndExcluding" : "28.7.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "29.0",
            "versionEndExcluding" : "29.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49567",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "name" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "28.0",
            "versionEndExcluding" : "28.7.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "29.0",
            "versionEndExcluding" : "29.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49564",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "name" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Illustrator versions 28.7.8, 29.6.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "28.0",
            "versionEndExcluding" : "28.7.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "29.0",
            "versionEndExcluding" : "29.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49563",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "name" : "https://helpx.adobe.com/security/products/illustrator/apsb25-74.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Illustrator versions 28.7.8, 29.6.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "28.0",
            "versionEndExcluding" : "28.7.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:adobe:illustrator:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "29.0",
            "versionEndExcluding" : "29.7",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32086",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-358"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improperly implemented security check for standard in the DDRIO configuration for some Intel(R) Xeon(R) 6 Processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32004",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01383.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01383.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the Intel Edger8r Tool for some Intel(R) SGX SDK may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27717",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) Graphics Driver software may allow an authenticated user to potentially enable escalation of privilege via local access"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27707",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27576",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27559",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01352.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01352.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some AI Playground software before version v2.3.0 alpha may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27537",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable escalation of privilege via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27250",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26863",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26697",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26472",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26470",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01345.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01345.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some Intel(R) Distribution for Python software installers before version 2025.1.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26404",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01347.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01347.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) DSA software before version 25.2.15.9 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26403",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01367.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in the memory subsystem for some Intel(R) Xeon(R) 6 processors when using Intel(R) SGX or Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25273",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-691"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24923",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01338.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01338.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path in some Intel(R) AI for Enterprise Retrieval-augmented Generation software may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24921",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-707"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable information disclosure via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24840",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24835",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-693"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Protection mechanism failure in the Intel(R) Graphics Driver for the Intel(R) Arc(TM) B-Series graphics before version 32.0.101.6737 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24523",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-693"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01317.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Protection mechanism failure for some Edge Orchestrator software before version 24.11.1 for Intel(R) Tiber(TM) Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24520",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01342.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01342.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of sensitive information into log file for some Intel(R) Local Manageability Service software before version 2514.7.16.0 may allow an authenticated user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24515",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NULL pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24511",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-665"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper initialization in the Linux kernel-mode driver for some Intel(R) I350 Series Ethernet before version 5.19.2 may allow an authenticated user to potentially enable Information disclosure via data exposure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24486",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24484",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24325",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24324",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24323",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01339.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01339.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in some firmware package and LED mode toggle tool for some Intel(R) PCIe Switch software before version MR4_1.0b1 may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24313",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01329.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01329.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Device Plugins for Kubernetes software maintained by Intel before version 0.32.0 may allow a privileged user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24305",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-691"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient control flow management in the Alias Checking Trusted Module (ACTM) firmware for some Intel(R) Xeon(R) processors may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24303",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper check for unusual or exceptional conditions in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24302",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-674"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled recursion for some TinyCBOR libraries maintained by Intel(R) before version 0.6.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24296",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01257.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01257.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in some firmware for the Intel(R) E810 Ethernet before version 4.6 may allow a privileged user to enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23241",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22893",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-691"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient control flow management in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22889",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1260"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01311.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper handling of overlap between protected memory ranges for some Intel(R) Xeon(R) 6 processor with Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22853",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-662"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper synchronization in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22840",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1281"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01308.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sequence of processor instructions leads to unexpected behavior for some Intel(R) Xeon(R) 6 Scalable processors may allow an authenticated user to potentially enable escalation of privilege via local access"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22839",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01310.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient granularity of access control in the OOB-MSM for some Intel(R) Xeon(R) 6 Scalable processors may allow a privileged user to potentially enable escalation of privilege via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22838",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01318.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01318.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) RealSense(TM) Dynamic Calibrator software before version 2.14.2.0 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22836",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Integer overflow or wraparound in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22392",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read in firmware for some Intel(R) AMT and Intel(R) Standard Manageability may allow a privileged user to potentially enable information disclosure via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21096",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper buffer restrictions in the firmware for some Intel(R) TDX may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-13T17:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21093",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01321.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01321.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path element for some Intel(R) Driver &amp; Support Assistant Tool software before version 24.6.49.8 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21090",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-771"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing reference to active allocated resource for some Intel(R) Xeon(R) processors may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21086",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01335.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the Linux kernel-mode driver for some Intel(R) 700 Series Ethernet before version 2.28.5 may allow an authenticated user to potentially enable escalation of privilege."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20627",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) oneAPI DPC++/C++ Compiler software before version 2025.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20625",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01292.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01292.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper conditions check for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.110.0.5 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20613",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-337"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01312.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Predictable Seed in Pseudo-Random Number Generator (PRNG) in the firmware for some Intel(R) TDX may allow an authenticated user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20109",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-653"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20099",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Intel(R) Rapid Storage Technology installation software may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20093",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper check for unusual or exceptional conditions in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20092",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Clock Jitter Tool software before version 6.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20090",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-822"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted Pointer Dereference for some Intel(R) QuickAssist Technology software before version 2.5.0 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20087",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some Intel(R) oneAPI DPC++/C++ Compiler software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20077",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing release of memory after effective lifetime in the UEFI OobRasMmbiHandlerDriver module for some Intel(R) reference server platforms may allow a privileged user to enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20074",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check Time-of-use race condition for some Intel(R) Connectivity Performance Suite software installers before version 40.24.11210 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20067",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-208"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Observable timing discrepancy in firmware for some Intel(R) CSME and Intel(R) SPS may allow a privileged user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20053",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20048",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for the Intel(R) Trace Analyzer and Collector software all verions may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20037",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check time-of-use race condition in firmware for some Intel(R) Converged Security and Management Engine may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20025",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-674"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled recursion for some TinyCBOR libraries maintained by Intel(R) before version 0.6.1 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20023",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20017",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) oneAPI Toolkit and component software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-33607",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01192.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01192.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read in some Intel(R) TDX module software before version TDX_1.5.07.00.774 may allow an authenticated user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8452",
        "ASSIGNER" : "cve@takeonme.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://help.runzero.com/docs/installing-an-explorer/",
          "name" : "https://help.runzero.com/docs/installing-an-explorer/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100851_000",
          "name" : "https://support.brother.com/g/b/faqend.aspx?c=us&lang=en&prod=group2&faqid=faq00100851_000",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001",
          "name" : "https://takeonme.org/gcves/GCVE-1337-2025-00000000000000000000000000000000000000000000000001011111011111010111111001000000000000000000000000000000000000000000000000000000001",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/",
          "name" : "https://www.rapid7.com/blog/post/multiple-brother-devices-multiple-vulnerabilities-fixed/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "By using the \"uscan\" protocol provided by the eSCL specification, an attacker can discover the serial number of multi-function printers that implement the Brother-provided firmware. This serial number can, in turn, can be leveraged by the flaw described by CVE-2024-51978 to calculate the default administrator password. This flaw is similar to CVE-2024-51977, with the only difference being the protocol by which an attacker can use to learn the remote device's serial number. The eSCL/uscan vector is typically only exposed on the local network. Any discovery service that implements the eSCL specification can be used to exploit this vulnerability, and one such implementation is the runZero Explorer. Changing the default administrator password will render this vulnerability virtually worthless, since the calculated default administrator password would no longer be the correct password."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-15T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55164",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1321"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/helmetjs/content-security-policy-parser/commit/b13a52554f0168af393e3e38ed4a94e9e6aea9dc",
          "name" : "https://github.com/helmetjs/content-security-policy-parser/commit/b13a52554f0168af393e3e38ed4a94e9e6aea9dc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/helmetjs/content-security-policy-parser/issues/11",
          "name" : "https://github.com/helmetjs/content-security-policy-parser/issues/11",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/helmetjs/content-security-policy-parser/security/advisories/GHSA-w2cq-g8g3-gm83",
          "name" : "https://github.com/helmetjs/content-security-policy-parser/security/advisories/GHSA-w2cq-g8g3-gm83",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "content-security-policy-parser parses content security policy directives. A prototype pollution vulnerability exists in versions 0.5.0 and earlier, wherein if a policy name is called __proto__, one can override the Object prototype. This issue has been patched in version 0.6.0. A workaround involves disabling prototype method in NodeJS, neutralizing all possible prototype pollution attacks. Provide either --disable-proto=delete (recommended) or --disable-proto=throw as an argument to node to enable this feature."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55011",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kanboard/kanboard/blob/b2e35ac520add67cff792aab960b3c002c48e3d0/app/Api/Procedure/TaskFileProcedure.php#L47-L57",
          "name" : "https://github.com/kanboard/kanboard/blob/b2e35ac520add67cff792aab960b3c002c48e3d0/app/Api/Procedure/TaskFileProcedure.php#L47-L57",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/commit/523a6135e944b6884c091a3fd7605af8ef133681",
          "name" : "https://github.com/kanboard/kanboard/commit/523a6135e944b6884c091a3fd7605af8ef133681",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55",
          "name" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55",
          "name" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-26f4-rx96-xc55",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, the createTaskFile method in the API does not validate whether the task_id parameter is a valid task id, nor does it check for path traversal. As a result, a malicious actor could write a file anywhere on the system the app user controls. The impact is limited due to the filename being hashed and having no extension. This issue has been patched in version 1.2.47."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55010",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kanboard/kanboard/blob/b033c0e0f982f8158e240bce8ab54c29727f8efe/app/Formatter/ProjectActivityEventFormatter.php#L43-L57",
          "name" : "https://github.com/kanboard/kanboard/blob/b033c0e0f982f8158e240bce8ab54c29727f8efe/app/Formatter/ProjectActivityEventFormatter.php#L43-L57",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/commit/7148ac092e5db6b33e0fc35e04bca328d96c1f6f",
          "name" : "https://github.com/kanboard/kanboard/commit/7148ac092e5db6b33e0fc35e04bca328d96c1f6f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r",
          "name" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r",
          "name" : "https://github.com/kanboard/kanboard/security/advisories/GHSA-359x-c69j-q64r",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.47, an unsafe deserialization vulnerability in the ProjectEventActvityFormatter allows admin users the ability to instantiate arbitrary php objects by modifying the event[\"data\"] field in the project_activities table. A malicious actor can update this field to use a php gadget to write a web shell into the /plugins folder, which then gives remote code execution on the host system. This issue has been patched in version 1.2.47."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54864",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NixOS/hydra/commit/f7bda020c6144913f134ec616783e57817f7686f",
          "name" : "https://github.com/NixOS/hydra/commit/f7bda020c6144913f134ec616783e57817f7686f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NixOS/hydra/security/advisories/GHSA-qpq3-646c-vgx9",
          "name" : "https://github.com/NixOS/hydra/security/advisories/GHSA-qpq3-646c-vgx9",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Hydra is a continuous integration service for Nix based projects. Prior to commit f7bda02, /api/push-github and /api/push-gitea are called by the corresponding forge without HTTP Basic authentication. Both forges do however feature HMAC signing with a secret key. Triggering an evaluation can be very taxing on the infrastructure when large evaluations are done, introducing potential denial of service attacks on the host running the evaluator. This issue has been patched by commit f7bda02. A workaround involves blocking /api/push-github and /api/push-gitea via a reverse proxy."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54800",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NixOS/hydra/commit/dea1e168f590efb27db32dbacc82b09e15f8ae4b",
          "name" : "https://github.com/NixOS/hydra/commit/dea1e168f590efb27db32dbacc82b09e15f8ae4b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/NixOS/hydra/security/advisories/GHSA-7qwg-q53v-vh99",
          "name" : "https://github.com/NixOS/hydra/security/advisories/GHSA-7qwg-q53v-vh99",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Hydra is a continuous integration service for Nix based projects. Prior to commit dea1e16, a malicious package can introduce arbitrary JavaScript code into the Hydra database that is automatically evaluated in a client's browser when anyone visits the build page. This could be done by a third-party project as part of its build process. This also happens in other places like with hydra-release-name. This issue has been patched by commit dea1e16. A workaround involves either not building untrusted packages or not visiting the builds page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3089",
        "ASSIGNER" : "psirt@servicenow.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2264930",
          "name" : "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB2264930",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ServiceNow has addressed a Broken Access Control vulnerability that was identified in the ServiceNow AI Platform. This vulnerability could allow a low privileged user to bypass access controls and perform a limited set of actions typically reserved for higher privileged users, potentially leading to unauthorized data modifications. This issue is addressed in the listed patches and family releases, which have been made available to hosted and self-hosted customers, as well as partners."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38500",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/5918c3f4800a3aef2173865e5903370f21e24f47",
          "name" : "https://git.kernel.org/stable/c/5918c3f4800a3aef2173865e5903370f21e24f47",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/69a31f7a6a81f5ffd3812c442e09ff0be22960f1",
          "name" : "https://git.kernel.org/stable/c/69a31f7a6a81f5ffd3812c442e09ff0be22960f1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a8d4748b954584ab7bd800f1a4e46d5b0eeb5ce4",
          "name" : "https://git.kernel.org/stable/c/a8d4748b954584ab7bd800f1a4e46d5b0eeb5ce4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a90b2a1aaacbcf0f91d7e4868ad6c51c5dee814b",
          "name" : "https://git.kernel.org/stable/c/a90b2a1aaacbcf0f91d7e4868ad6c51c5dee814b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/bfebdb85496e1da21d3cf05de099210915c3e706",
          "name" : "https://git.kernel.org/stable/c/bfebdb85496e1da21d3cf05de099210915c3e706",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nxfrm: interface: fix use-after-free after changing collect_md xfrm interface\n\ncollect_md property on xfrm interfaces can only be set on device creation,\nthus xfrmi_changelink() should fail when called on such interfaces.\n\nThe check to enforce this was done only in the case where the xi was\nreturned from xfrmi_locate() which doesn't look for the collect_md\ninterface, and thus the validation was never reached.\n\nCalling changelink would thus errornously place the special interface xi\nin the xfrmi_net->xfrmi hash, but since it also exists in the\nxfrmi_net->collect_md_xfrmi pointer it would lead to a double free when\nthe net namespace was taken down [1].\n\nChange the check to use the xi from netdev_priv which is available earlier\nin the function to prevent changes in xfrm collect_md interfaces.\n\n[1] resulting oops:\n[    8.516540] kernel BUG at net/core/dev.c:12029!\n[    8.516552] Oops: invalid opcode: 0000 [#1] SMP NOPTI\n[    8.516559] CPU: 0 UID: 0 PID: 12 Comm: kworker/u80:0 Not tainted 6.15.0-virtme #5 PREEMPT(voluntary)\n[    8.516565] Hardware name: QEMU Ubuntu 24.04 PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\n[    8.516569] Workqueue: netns cleanup_net\n[    8.516579] RIP: 0010:unregister_netdevice_many_notify+0x101/0xab0\n[    8.516590] Code: 90 0f 0b 90 48 8b b0 78 01 00 00 48 8b 90 80 01 00 00 48 89 56 08 48 89 32 4c 89 80 78 01 00 00 48 89 b8 80 01 00 00 eb ac 90 <0f> 0b 48 8b 45 00 4c 8d a0 88 fe ff ff 48 39 c5 74 5c 41 80 bc 24\n[    8.516593] RSP: 0018:ffffa93b8006bd30 EFLAGS: 00010206\n[    8.516598] RAX: ffff98fe4226e000 RBX: ffffa93b8006bd58 RCX: ffffa93b8006bc60\n[    8.516601] RDX: 0000000000000004 RSI: 0000000000000000 RDI: dead000000000122\n[    8.516603] RBP: ffffa93b8006bdd8 R08: dead000000000100 R09: ffff98fe4133c100\n[    8.516605] R10: 0000000000000000 R11: 00000000000003d2 R12: ffffa93b8006be00\n[    8.516608] R13: ffffffff96c1a510 R14: ffffffff96c1a510 R15: ffffa93b8006be00\n[    8.516615] FS:  0000000000000000(0000) GS:ffff98fee73b7000(0000) knlGS:0000000000000000\n[    8.516619] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[    8.516622] CR2: 00007fcd2abd0700 CR3: 000000003aa40000 CR4: 0000000000752ef0\n[    8.516625] PKRU: 55555554\n[    8.516627] Call Trace:\n[    8.516632]  <TASK>\n[    8.516635]  ? rtnl_is_locked+0x15/0x20\n[    8.516641]  ? unregister_netdevice_queue+0x29/0xf0\n[    8.516650]  ops_undo_list+0x1f2/0x220\n[    8.516659]  cleanup_net+0x1ad/0x2e0\n[    8.516664]  process_one_work+0x160/0x380\n[    8.516673]  worker_thread+0x2aa/0x3c0\n[    8.516679]  ? __pfx_worker_thread+0x10/0x10\n[    8.516686]  kthread+0xfb/0x200\n[    8.516690]  ? __pfx_kthread+0x10/0x10\n[    8.516693]  ? __pfx_kthread+0x10/0x10\n[    8.516697]  ret_from_fork+0x82/0xf0\n[    8.516705]  ? __pfx_kthread+0x10/0x10\n[    8.516709]  ret_from_fork_asm+0x1a/0x30\n[    8.516718]  </TASK>"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T16:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8310",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Virtual-Application-Delivery-Controller-vADC-previously-vTM-CVE-2025-8310?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Virtual-Application-Delivery-Controller-vADC-previously-vTM-CVE-2025-8310?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing authorization in the admin console of Ivanti Virtual Application Delivery Controller before version 22.9 allows a remote authenticated attacker to take over admin accounts by resetting the password"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8297",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-CVE-2025-8296-CVE-2025-8297?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-CVE-2025-8296-CVE-2025-8297?language=en_US",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incomplete restriction of configuration in Ivanti Avalanche before version 6.4.8.8008 allows a remote authenticated attacker with admin privileges to achieve remote code execution"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
          "versionEndExcluding" : "6.4.8.8008",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-15T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8296",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-CVE-2025-8296-CVE-2025-8297?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Avalanche-CVE-2025-8296-CVE-2025-8297?language=en_US",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection in Ivanti Avalanche before version 6.4.8.8008 allows a remote authenticated attacker with admin privileges to execute arbitrary SQL queries. In certain conditions, this can also lead to remote code execution"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:avalanche:*:*:*:*:premise:*:*:*",
          "versionEndExcluding" : "6.4.8.8008",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-15T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5468",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-61"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper handling of symbolic links in Ivanti Connect Secure before version 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a local authenticated attacker to read arbitrary files on disk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5466",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-776"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "XEE in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote authenticated attacker with admin privileges to trigger a denial of service"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5462",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A heap-based buffer overflow in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 22.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to trigger a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5456",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "name" : "https://forums.ivanti.com/s/article/August-Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-Multiple-CVEs?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A buffer over-read vulnerability in Ivanti Connect Secure before 22.7R2.8 or 22.8R2, Ivanti Policy Secure before 22.7R1.5, Ivanti ZTA Gateway before 2.8R2.3-723 and Ivanti Neurons for Secure Access before 22.8R1.4 (Fix deployed on 02-Aug-2025) allows a remote unauthenticated attacker to trigger a denial of service. CWE-125"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3831",
        "ASSIGNER" : "cve@checkpoint.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.checkpoint.com/results/sk/sk183761",
          "name" : "https://support.checkpoint.com/results/sk/sk183761",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Log files uploaded during troubleshooting by the Harmony SASE agent may have been accessible to unauthorized parties."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-38805",
        "ASSIGNER" : "infosec@edk2.groups.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/tianocore/edk2/security/advisories/GHSA-p7wp-52j7-6r5x",
          "name" : "https://github.com/tianocore/edk2/security/advisories/GHSA-p7wp-52j7-6r5x",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EDK2 contains a vulnerability in BIOS where a user may cause an Integer Overflow or Wraparound by network means. A successful exploitation of this vulnerability may lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T15:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22834",
        "ASSIGNER" : "biossecurity@ami.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025006.pdf",
          "name" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025006.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AMI APTIOV contains a vulnerability in BIOS where a user may cause “Improper Initialization” by local accessing. Successful exploitation of this vulnerability may leave the resource in an unexpected state and potentially impact confidentiality, integrity, and availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T14:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-22830",
        "ASSIGNER" : "biossecurity@ami.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025006.pdf",
          "name" : "https://go.ami.com/hubfs/Security%20Advisories/2025/AMI-SA-2025006.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "APTIOV contains a vulnerability in BIOS where a skilled user may cause “Race Condition” by local access. A successful exploitation of this vulnerability may lead to resource exhaustion and impact Confidentiality, Integrity, and Availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T14:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43735",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43735",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43735",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the Liferay Portal 7.4.0 through 7.4.3.131, and Liferay DXP 2024.Q4.0 through 2024.Q4.7, 2024.Q3.1 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.12 and 7.4 GA through update 92 allows an remote non-authenticated attacker to inject JavaScript into the google_gadget."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T13:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40770",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-300"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions). The affected application uses a monitoring interface that is not operating in a strictly passive mode. This could allow an attacker to interact with the interface, leading to man-in-the-middle attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.4,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40769",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1164"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V3.0). The affected application uses a Content Security Policy that allows unsafe script execution methods. This could allow an attacker to execute unauthorized scripts, potentially leading to cross-site scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.4,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40768",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V3.0). The affected application exposes an internal service port to be accessible from outside the system. This could allow an unauthorized attacker to access the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-15T18:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40767",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V3.0). The affected application runs docker containers without adequate security controls to enforce isolation. This could allow an attacker to gain elevated access, potentially accessing sensitive host system resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-15T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40766",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-517338.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINEC Traffic Analyzer (6GK8822-1BG01-0BA0) (All versions < V3.0). The affected application runs docker containers without adequate resource and security limitations. This could allow an attacker to perform a denial-of-service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:sinec_traffic_analyzer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-15T17:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40764",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-674084.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-674084.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in Simcenter Femap V2406 (All versions < V2406.0003), Simcenter Femap V2412 (All versions < V2412.0002). The affected applications contains an out of bounds read vulnerability while parsing specially crafted BMP files. This could allow an attacker to execute code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40762",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-674084.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-674084.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in Simcenter Femap V2406 (All versions < V2406.0003), Simcenter Femap V2412 (All versions < V2412.0002). The affected applications contain an out of bounds write vulnerability when parsing a specially crafted STP file. This could allow an attacker to execute code in the context of the current process.(ZDI-CAN-26692)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40761",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-094954.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-094954.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions), RUGGEDCOM ROX MX5000RE (All versions), RUGGEDCOM ROX RX1400 (All versions), RUGGEDCOM ROX RX1500 (All versions), RUGGEDCOM ROX RX1501 (All versions), RUGGEDCOM ROX RX1510 (All versions), RUGGEDCOM ROX RX1511 (All versions), RUGGEDCOM ROX RX1512 (All versions), RUGGEDCOM ROX RX1524 (All versions), RUGGEDCOM ROX RX1536 (All versions), RUGGEDCOM ROX RX5000 (All versions). Affected devices do not properly limit access through its Built-In-Self-Test (BIST) mode.\r\nThis could allow an attacker with physical access to the serial interface to bypass authentication and get access to a root shell on the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40759",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-493396.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-493396.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions < V19 Update 4), SIMATIC STEP 7 V20 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions < V19 Update 4), SIMATIC WinCC V20 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOCODE ES V20 (All versions), SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SIMOTION SCOUT TIA V5.7 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SINAMICS Startdrive V20 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Safety ES V20 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V20 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions < V5.2.1.1), TIA Portal Cloud V20 (All versions). Affected products do not properly sanitize stored security properties when parsing project files. This could allow an attacker to cause a type confusion and execute arbitrary code within the affected application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40753",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-529291.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-529291.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices export the password for the SMTP account as plain text in the Configuration File. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40752",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-529291.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-529291.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in POWER METER SICAM Q100 (7KG9501-0AA01-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA01-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-0AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q100 (7KG9501-0AA31-2AA1) (All versions >= V2.60 < V2.62), POWER METER SICAM Q200 family (All versions >= V2.70 < V2.80). Affected devices store the password for the SMTP account as plain text. This could allow an authenticated local attacker to extract it and use the configured SMTP service for arbitrary purposes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40751",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-707630.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-707630.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.3). Affected SIMATIC RTLS Locating Manager Report Clients do not properly protect credentials that are used to authenticate to the server. This could allow an authenticated local attacker to extract the credentials and use them to escalate their access rights from the Manager to the Systemadministrator role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.0,
        "impactScore" : 3.7
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40746",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-493787.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-493787.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.2). Affected products do not properly validate input for a backup script. This could allow an authenticated remote attacker with high privileges in the application to execute arbitrary code with 'NT Authority/SYSTEM' privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40743",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-177847.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-177847.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SINUMERIK 828D PPU.4 (All versions < V4.95 SP5), SINUMERIK 828D PPU.5 (All versions < V5.25 SP1), SINUMERIK 840D sl (All versions < V4.95 SP5), SINUMERIK MC (All versions < V1.25 SP1), SINUMERIK MC V1.15 (All versions < V1.15 SP5), SINUMERIK ONE (All versions < V6.25 SP1), SINUMERIK ONE V6.15 (All versions < V6.15 SP5). The affected application improperly validates authentication for its VNC access service, allowing access with insufficient password verification.\r\nThis could allow an attacker to gain unauthorized remote access and potentially compromise system confidentiality, integrity, or availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "LOW",
          "baseScore" : 8.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.5
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40584",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-186293.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-186293.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SIMOTION SCOUT TIA V5.7 (All versions < V5.7 SP1 HF1), SIMOTION SCOUT V5.4 (All versions), SIMOTION SCOUT V5.5 (All versions), SIMOTION SCOUT V5.6 (All versions < V5.6 SP1 HF7), SIMOTION SCOUT V5.7 (All versions < V5.7 SP1 HF1), SINAMICS STARTER V5.5 (All versions), SINAMICS STARTER V5.6 (All versions), SINAMICS STARTER V5.7 (All versions). The affected application contains a XML External Entity Injection (XXE) vulnerability while parsing specially crafted XML files. This could allow an attacker to read arbitrary files in the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40570",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-894058.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-894058.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIPROTEC 5 6MD84 (CP300) (All versions < V10.0), SIPROTEC 5 6MD85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 6MD86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 6MD89 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 6MU85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7KE85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SA82 (CP150) (All versions < V10.0), SIPROTEC 5 7SA86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SA87 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SD82 (CP150) (All versions < V10.0), SIPROTEC 5 7SD86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SD87 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SJ81 (CP150) (All versions < V10.0), SIPROTEC 5 7SJ82 (CP150) (All versions < V10.0), SIPROTEC 5 7SJ85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SJ86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SK82 (CP150) (All versions < V10.0), SIPROTEC 5 7SK85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SL82 (CP150) (All versions < V10.0), SIPROTEC 5 7SL86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SL87 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7SS85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7ST85 (CP300) (All versions < V10.0), SIPROTEC 5 7ST86 (CP300) (All versions < V10.0), SIPROTEC 5 7SX82 (CP150) (All versions < V10.0), SIPROTEC 5 7SX85 (CP300) (All versions < V10.0), SIPROTEC 5 7SY82 (CP150) (All versions < V10.0), SIPROTEC 5 7UM85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7UT82 (CP150) (All versions < V10.0), SIPROTEC 5 7UT85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7UT86 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7UT87 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7VE85 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7VK87 (CP300) (All versions >= V7.80 < V10.0), SIPROTEC 5 7VU85 (CP300) (All versions < V10.0), SIPROTEC 5 Compact 7SX800 (CP050) (All versions < V10.0). Affected devices do not properly limit the bandwidth for incoming network packets over their local USB port. This could allow an attacker with physical access to send specially crafted packets with high bandwidth to the affected devices thus forcing them to exhaust their memory and stop responding to any network traffic via the local USB port. Affected devices reset themselves automatically after a successful attack. The protection function is not affected of this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33023",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-665108.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-665108.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in RUGGEDCOM ROX MX5000 (All versions), RUGGEDCOM ROX MX5000RE (All versions), RUGGEDCOM ROX RX1400 (All versions), RUGGEDCOM ROX RX1500 (All versions), RUGGEDCOM ROX RX1501 (All versions), RUGGEDCOM ROX RX1510 (All versions), RUGGEDCOM ROX RX1511 (All versions), RUGGEDCOM ROX RX1512 (All versions), RUGGEDCOM ROX RX1524 (All versions), RUGGEDCOM ROX RX1536 (All versions), RUGGEDCOM ROX RX5000 (All versions). The  affected devices do not properly enforce the restriction of files that can be uploaded from the web interface. This could allow an authenticated remote attacker with high privileges in the web interface to upload arbitrary files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30034",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-617"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-707630.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-707630.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMATIC RTLS Locating Manager (All versions < V3.3). Affected devices do not properly validate input sent to its listening port on the local loopback interface. This could allow an unauthenticated local attacker to cause a denial of service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30033",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-282044.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-282044.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The affected setup component is vulnerable to DLL hijacking. This could allow an attacker to execute arbitrary code when a legitimate user installs an application that uses the affected setup component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-54678",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-693808.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-693808.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIMATIC PCS neo V4.1 (All versions), SIMATIC PCS neo V5.0 (All versions), SIMATIC PCS neo V6.0 (All versions), SIMATIC S7-PLCSIM V17 (All versions), SIMATIC STEP 7 V17 (All versions), SIMATIC STEP 7 V18 (All versions), SIMATIC STEP 7 V19 (All versions < V19 Update 4), SIMATIC STEP 7 V20 (All versions), SIMATIC WinCC V17 (All versions), SIMATIC WinCC V18 (All versions), SIMATIC WinCC V19 (All versions < V19 Update 4), SIMATIC WinCC V20 (All versions), SIMOCODE ES V17 (All versions), SIMOCODE ES V18 (All versions), SIMOCODE ES V19 (All versions), SIMOCODE ES V20 (All versions), SIMOTION SCOUT TIA V5.4 (All versions), SIMOTION SCOUT TIA V5.5 (All versions), SIMOTION SCOUT TIA V5.6 (All versions < V5.6 SP1 HF7), SIMOTION SCOUT TIA V5.7 (All versions), SINAMICS Startdrive V17 (All versions), SINAMICS Startdrive V18 (All versions), SINAMICS Startdrive V19 (All versions), SINAMICS Startdrive V20 (All versions), SIRIUS Safety ES V17 (TIA Portal) (All versions), SIRIUS Safety ES V18 (TIA Portal) (All versions), SIRIUS Safety ES V19 (TIA Portal) (All versions), SIRIUS Safety ES V20 (TIA Portal) (All versions), SIRIUS Soft Starter ES V17 (TIA Portal) (All versions), SIRIUS Soft Starter ES V18 (TIA Portal) (All versions), SIRIUS Soft Starter ES V19 (TIA Portal) (All versions), SIRIUS Soft Starter ES V20 (TIA Portal) (All versions), TIA Portal Cloud V17 (All versions), TIA Portal Cloud V18 (All versions), TIA Portal Cloud V19 (All versions < V5.2.1.1), TIA Portal Cloud V20 (All versions), TIA Portal Test Suite V20 (All versions). Affected products do not properly sanitize Interprocess Communication input received through a Windows Named Pipe accessible to all local users. This could allow an authenticated local attacker to cause a type confusion and execute arbitrary code within the affected application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.5,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52504",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-400089.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-400089.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SIPROTEC 4 6MD61 (All versions), SIPROTEC 4 6MD63 (All versions), SIPROTEC 4 6MD66 (All versions), SIPROTEC 4 6MD665 (All versions), SIPROTEC 4 7SA522 (All versions), SIPROTEC 4 7SA6 (All versions < V4.78), SIPROTEC 4 7SD5 (All versions < V4.78), SIPROTEC 4 7SD610 (All versions < V4.78), SIPROTEC 4 7SJ61 (All versions), SIPROTEC 4 7SJ62 (All versions), SIPROTEC 4 7SJ63 (All versions), SIPROTEC 4 7SJ64 (All versions), SIPROTEC 4 7SJ66 (All versions), SIPROTEC 4 7SS52 (All versions), SIPROTEC 4 7ST6 (All versions), SIPROTEC 4 7UM61 (All versions), SIPROTEC 4 7UM62 (All versions), SIPROTEC 4 7UT612 (All versions), SIPROTEC 4 7UT613 (All versions), SIPROTEC 4 7UT63 (All versions), SIPROTEC 4 7VE6 (All versions), SIPROTEC 4 7VK61 (All versions), SIPROTEC 4 7VU683 (All versions), SIPROTEC 4 Compact 7RW80 (All versions), SIPROTEC 4 Compact 7SD80 (All versions), SIPROTEC 4 Compact 7SJ80 (All versions), SIPROTEC 4 Compact 7SJ81 (All versions), SIPROTEC 4 Compact 7SK80 (All versions), SIPROTEC 4 Compact 7SK81 (All versions). Affected devices do not properly handle interrupted operations of file transfer. This could allow an unauthenticated remote attacker to cause a denial of service condition. To restore normal operations, the devices need to be restarted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41986",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-327"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application support insecure TLS 1.0 and 1.1 protocol. An attacker could achieve a man-in-the-middle attack and compromise confidentiality and integrity of data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41985",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-613"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application does not expire the session without logout. This could allow an attacker to get unauthorized access if the session is left idle."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.6,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41984",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application improperly handles error while accessing an inaccessible resource leading to exposing the system applications."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.6,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41983",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application displays SQL statement in the error messages encountered during the generation of reports using Cockpit tool."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41982",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-311"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application does not have adequate encryption of sensitive information. This could allow an authenticated attacker to gain access of sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41980",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-311"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application do not encrypt the communication in LDAP interface by default. This could allow an authenticated attacker to gain unauthorized access to sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41979",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-382999.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in SmartClient modules Opcenter QL Home (SC) (All versions >= V13.2 < V2506), SOA Audit (All versions >= V13.2 < V2506), SOA Cockpit (All versions >= V13.2 < V2506). The affected application does not enforce mandatory authorization on some functionality level at server side. This could allow an authenticated attacker to gain complete access of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T12:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-43736",
        "ASSIGNER" : "security@liferay.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43736",
          "name" : "https://liferay.dev/portal/security/known-vulnerabilities/-/asset_publisher/jekt/content/CVE-2025-43736",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial Of Service via File Upload (DOS) vulnerability in the Liferay Portal 7.4.3.0 through 7.4.3.132, and Liferay DXP 2025.Q1.0 through 2025.Q1.8, 2024.Q4.0 through 2024.Q4.7, 2024.Q3.0 through 2024.Q3.13, 2024.Q2.0 through 2024.Q2.13, 2024.Q1.1 through 2024.Q1.16 and 7.4 GA through update 92 allows a user to upload more than 300kb profile picture into the user profile. This size more than the noted max 300kb size. This extra amount of data can make Liferay slower."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T11:15Z",
    "lastModifiedDate" : "2025-08-12T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8885",
        "ASSIGNER" : "feedback-crypto@bouncycastle.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%908885",
          "name" : "https://github.com/bcgit/bc-java/wiki/CVE%E2%80%902025%E2%80%908885",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allocation of Resources Without Limits or Throttling vulnerability in Legion of the Bouncy Castle Inc. Bouncy Castle for Java bcprov, bc-fips on All (API modules) allows Excessive Allocation. This vulnerability is associated with program files https://github.Com/bcgit/bc-java/blob/main/core/src/main/java/org/bouncycastle/asn1/ASN1ObjectIdentifier.Java.\n\nThis issue affects Bouncy Castle for Java: from BC 1.0 through 1.77, from BC-FJA 1.0.0 through 1.0.2.5, from BC-FJA 2.0.0 through 2.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T10:15Z",
    "lastModifiedDate" : "2025-08-16T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-41686",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://certvde.com/de/advisories/VDE-2025-063",
          "name" : "https://certvde.com/de/advisories/VDE-2025-063",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low-privileged local attacker can exploit improper permissions on nssm.exe to escalate their privileges and gain administrative access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T08:15Z",
    "lastModifiedDate" : "2025-08-12T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26398",
        "ASSIGNER" : "psirt@solarwinds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.solarwinds.com/en/success_center/dpa/content/release_notes/dpa_2025-3_release_notes.htm",
          "name" : "https://documentation.solarwinds.com/en/success_center/dpa/content/release_notes/dpa_2025-3_release_notes.htm",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26398",
          "name" : "https://www.solarwinds.com/trust-center/security-advisories/CVE-2025-26398",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SolarWinds Database Performance Analyzer was found to contain a hard-coded cryptographic key. If exploited, this vulnerability could lead to a machine-in-the-middle (MITM) attack against users. This vulnerability requires additional software not installed by default, local access to the server and administrator level privileges on the host."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.3,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-12T08:15Z",
    "lastModifiedDate" : "2025-08-12T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8874",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/assets/vendor/fancybox/jquery.fancybox.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/assets/vendor/fancybox/jquery.fancybox.min.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3338452%40master-addons&new=3338452%40master-addons&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3338452%40master-addons&new=3338452%40master-addons&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340128%40master-addons&new=3340128%40master-addons&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340128%40master-addons&new=3340128%40master-addons&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/log/master-addons/",
          "name" : "https://plugins.trac.wordpress.org/log/master-addons/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44e4fb1b-eed4-4ef9-9856-7c5095117aa7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44e4fb1b-eed4-4ef9-9856-7c5095117aa7?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 2.0.8.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T07:15Z",
    "lastModifiedDate" : "2025-08-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8767",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1236"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://plugins.trac.wordpress.org/changeset/3342787/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php",
          "name" : "http://plugins.trac.wordpress.org/changeset/3342787/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L265",
          "name" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L265",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L58",
          "name" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L58",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L93",
          "name" : "https://plugins.trac.wordpress.org/browser/football-leagues-by-anwppro/trunk/includes/class-anwpfl-data-port.php#L93",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/04676263-cdad-40cd-bb54-61beb727e09d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/04676263-cdad-40cd-bb54-61beb727e09d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AnWP Football Leagues plugin for WordPress is vulnerable to CSV Injection in all versions up to, and including, 0.16.17 via the 'download_csv_players' and 'download_csv_games' functions. This makes it possible for authenticated attackers, with Administrator-level access and above, to embed untrusted input into exported CSV files, which can result in code execution when these files are downloaded and opened on a local system with a vulnerable configuration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T07:15Z",
    "lastModifiedDate" : "2025-08-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8482",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/simple-local-avatars/tags/2.8.4/includes/class-simple-local-avatars.php#L123",
          "name" : "https://plugins.trac.wordpress.org/browser/simple-local-avatars/tags/2.8.4/includes/class-simple-local-avatars.php#L123",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/simple-local-avatars/tags/2.8.4/includes/class-simple-local-avatars.php?marks=1663-1672#L1663",
          "name" : "https://plugins.trac.wordpress.org/browser/simple-local-avatars/tags/2.8.4/includes/class-simple-local-avatars.php?marks=1663-1672#L1663",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340223%40simple-local-avatars&new=3340223%40simple-local-avatars&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3340223%40simple-local-avatars&new=3340223%40simple-local-avatars&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/69d78334-2b38-43ee-acf6-c073d5826213?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/69d78334-2b38-43ee-acf6-c073d5826213?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Simple Local Avatars plugin for WordPress is vulnerable to unauthorized modification of data in version 2.8.4. This is due to a missing capability check on the migrate_from_wp_user_avatar() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to migrate avatar metadata for all users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T07:15Z",
    "lastModifiedDate" : "2025-08-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8418",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.28/adminMenu.php#L124",
          "name" : "https://plugins.trac.wordpress.org/browser/b-slider/tags/1.1.28/adminMenu.php#L124",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3342079/b-slider/trunk/adminMenu.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3342079/b-slider/trunk/adminMenu.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/deffd646-5117-4086-bf4b-8a17ffdaad8b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/deffd646-5117-4086-bf4b-8a17ffdaad8b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The B Slider- Gutenberg Slider Block for WP plugin for WordPress is vulnerable to Arbitrary Plugin Installation in all versions up to, and including, 1.1.30. This is due to missing capability checks on the activated_plugin function. This makes it possible for authenticated attackers, with subscriber-level access and above, to install arbitrary plugins on the server which can make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T07:15Z",
    "lastModifiedDate" : "2025-08-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47444",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-201"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/impress-org/givewp/issues/8042",
          "name" : "https://github.com/impress-org/givewp/issues/8042",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://patchstack.com/database/wordpress/plugin/give/vulnerability/wordpress-givewp-plugin-4-6-1-pii-sensitive-data-exposure-vulnerability",
          "name" : "https://patchstack.com/database/wordpress/plugin/give/vulnerability/wordpress-givewp-plugin-4-6-1-pii-sensitive-data-exposure-vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information Into Sent Data vulnerability in Liquid Web GiveWP allows Retrieve Embedded Sensitive Data.This issue affects GiveWP: from n/a before 4.6.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T07:15Z",
    "lastModifiedDate" : "2025-08-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8081",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/elementor/elementor/commit/6af3551ee4213fb4003338743e22f41aa2a09c01",
          "name" : "https://github.com/elementor/elementor/commit/6af3551ee4213fb4003338743e22f41aa2a09c01",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/elementor/tags/3.30.2/includes/template-library/classes/class-import-images.php#L111",
          "name" : "https://plugins.trac.wordpress.org/browser/elementor/tags/3.30.2/includes/template-library/classes/class-import-images.php#L111",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3332233/elementor/trunk/includes/template-library/classes/class-import-images.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3332233/elementor/trunk/includes/template-library/classes/class-import-images.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/13929b51-b32e-401c-a642-49f7cd2d07bf?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/13929b51-b32e-401c-a642-49f7cd2d07bf?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Elementor plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 3.30.2 via the Import_Images::import() function due to insufficient controls on the filename specified. This makes it possible for authenticated attackers, with administrator-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "3.30.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T06:15Z",
    "lastModifiedDate" : "2025-08-15T18:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6253",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3314574/uicore-elements#file3",
          "name" : "https://plugins.trac.wordpress.org/changeset/3314574/uicore-elements#file3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7cd6e44-bd78-4eb8-bab8-09e2af583222?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c7cd6e44-bd78-4eb8-bab8-09e2af583222?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The UiCore Elements – Free Elementor widgets and templates plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 1.3.0 via the prepare_template() function due to a missing capability check and insufficient controls on the filename specified. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T06:15Z",
    "lastModifiedDate" : "2025-08-12T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3892",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/ae/19/16/cve-2025-3892pdf-en-US-492760.pdf",
          "name" : "https://www.axis.com/dam/public/ae/19/16/cve-2025-3892pdf-en-US-492760.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ACAP applications can be executed with elevated privileges, potentially leading to privilege escalation. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T06:15Z",
    "lastModifiedDate" : "2025-08-12T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30027",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/ab/9a/a5/cve-2025-30027pdf-en-US-492762.pdf",
          "name" : "https://www.axis.com/dam/public/ab/9a/a5/cve-2025-30027pdf-en-US-492762.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An ACAP configuration file lacked sufficient input validation, which could allow for arbitrary code execution. This vulnerability can only be exploited if the Axis device is configured to allow the installation of unsigned ACAP applications, and if an attacker convinces the victim to install a malicious ACAP application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T06:15Z",
    "lastModifiedDate" : "2025-08-12T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8314",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/software-issue-manager/tags/5.0.0/includes/emd-form-builder-lite/emd-form-frontend.php",
          "name" : "https://plugins.svn.wordpress.org/software-issue-manager/tags/5.0.0/includes/emd-form-builder-lite/emd-form-frontend.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3341018/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3341018/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/software-issue-manager/#developers",
          "name" : "https://wordpress.org/plugins/software-issue-manager/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ef87ab8-d56b-4d3a-b4fc-6c17c24143ec?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ef87ab8-d56b-4d3a-b4fc-6c17c24143ec?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Software Issue Manager plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘noaccess_msg parameter in all versions up to, and including, 5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T05:15Z",
    "lastModifiedDate" : "2025-08-12T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8059",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/b-blocks/trunk/includes/blocks/RegisterForm.php#L77",
          "name" : "https://plugins.trac.wordpress.org/browser/b-blocks/trunk/includes/blocks/RegisterForm.php#L77",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3340770/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3340770/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/b-blocks/#developers",
          "name" : "https://wordpress.org/plugins/b-blocks/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee3b389-60c9-4f8e-9428-a71a6d9b20aa?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0ee3b389-60c9-4f8e-9428-a71a6d9b20aa?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The B Blocks plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization and improper input validation within the rgfr_registration() function in all versions up to, and including, 2.0.6. This makes it possible for unauthenticated attackers to create a new account and assign it the administrator role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T05:15Z",
    "lastModifiedDate" : "2025-08-12T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7622",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/c5/9a/3c/cve-2025-7622pdf-en-US-492761.pdf",
          "name" : "https://www.axis.com/dam/public/c5/9a/3c/cve-2025-7622pdf-en-US-492761.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an internal security assessment, a Server-Side Request Forgery (SSRF) vulnerability that allowed an authenticated attacker to access internal resources on the server was discovered."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T05:15Z",
    "lastModifiedDate" : "2025-08-12T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8690",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/addi-simple-slider/tags/2.0/methods.php",
          "name" : "https://plugins.svn.wordpress.org/addi-simple-slider/tags/2.0/methods.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/addi-simple-slider/#developers",
          "name" : "https://wordpress.org/plugins/addi-simple-slider/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7888aedb-5421-4c3a-8459-d6177b398a06?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7888aedb-5421-4c3a-8459-d6177b398a06?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Simple Responsive Slider plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8688",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/inline-stock-quotes/trunk/inline-quotes.php",
          "name" : "https://plugins.svn.wordpress.org/inline-stock-quotes/trunk/inline-quotes.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/inline-stock-quotes/#developers",
          "name" : "https://wordpress.org/plugins/inline-stock-quotes/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/93ab3e05-dbaf-4f55-a411-793a74c75071?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/93ab3e05-dbaf-4f55-a411-793a74c75071?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Inline Stock Quotes plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's stock shortcode in all versions up to, and including, 0.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8685",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/wp-chart-generator/trunk/wp-chart.php",
          "name" : "https://plugins.svn.wordpress.org/wp-chart-generator/trunk/wp-chart.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-chart-generator/#developers",
          "name" : "https://wordpress.org/plugins/wp-chart-generator/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/25302010-202a-458e-93b6-2e6b8604c091?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/25302010-202a-458e-93b6-2e6b8604c091?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Wp chart generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's wpchart shortcode in all versions up to, and including, 1.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8621",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/mosaic-generator/#developers",
          "name" : "https://wordpress.org/plugins/mosaic-generator/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/91c87d34-ef9a-42f4-b11a-7c5a5c842550?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/91c87d34-ef9a-42f4-b11a-7c5a5c842550?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Mosaic Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘c’ parameter in all versions up to, and including, 1.0.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8568",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/gmap-venturit/trunk/google-map.php",
          "name" : "https://plugins.svn.wordpress.org/gmap-venturit/trunk/google-map.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/gmap-venturit/#developers",
          "name" : "https://wordpress.org/plugins/gmap-venturit/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7875d6-e866-4625-94e5-2ef8a1d11503?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cd7875d6-e866-4625-94e5-2ef8a1d11503?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GMap Generator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘h’ parameter in all versions up to, and including, 1.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8462",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/rt-easy-builder-advanced-addons-for-elementor/",
          "name" : "https://wordpress.org/plugins/rt-easy-builder-advanced-addons-for-elementor/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb02fd7-1090-4139-ae0e-977fdec5da7f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0bb02fd7-1090-4139-ae0e-977fdec5da7f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The RT Easy Builder – Advanced addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the social URL parameter in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5391",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wc-purchase-orders/trunk/includes/class-bbpo-purchase-orders.php#L151",
          "name" : "https://plugins.trac.wordpress.org/browser/wc-purchase-orders/trunk/includes/class-bbpo-purchase-orders.php#L151",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wc-purchase-orders/trunk/includes/class-bbpo-purchase-orders-files.php#L148",
          "name" : "https://plugins.trac.wordpress.org/browser/wc-purchase-orders/trunk/includes/class-bbpo-purchase-orders-files.php#L148",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05a27a34-b324-4968-937e-2c0d24175d2a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05a27a34-b324-4968-937e-2c0d24175d2a?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WooCommerce Purchase Orders plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_file() function in all versions up to, and including, 1.0.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4390",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-private-content-plus/trunk/classes/class-wppcp-private-posts-pages.php#L138",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-private-content-plus/trunk/classes/class-wppcp-private-posts-pages.php#L138",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-private-content-plus/trunk/classes/class-wppcp-private-posts-pages.php#L211",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-private-content-plus/trunk/classes/class-wppcp-private-posts-pages.php#L211",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c305546-1548-4b77-a484-d7c51d829792?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4c305546-1548-4b77-a484-d7c51d829792?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Private Content Plus plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.6.2 via the 'validate_restrictions' function. This makes it possible for unauthenticated attackers to extract sensitive data including the content of resticted posts on archive and feed pages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42976",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3611184",
          "name" : "https://me.sap.com/notes/3611184",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server ABAP (BIC Document) allows an authenticated attacker to craft a request that, when submitted to a BIC Document application, could cause a memory corruption error. On successful exploitation, this results in the crash of the target component. Multiple submissions can make the target completely unavailable. A similarly crafted submission can be used to perform an out-of-bounds read operation as well, revealing sensitive information that is loaded in memory at that time. There is no ability to modify any information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42975",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3611184",
          "name" : "https://me.sap.com/notes/3611184",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server ABAP (BIC Document) allows an unauthenticated attacker to craft a URL link which, when accessed on the BIC Document application, embeds a malicious script. When a victim clicks on this link, the script executes in the victim's browser, allowing the attacker to access and/or modify information related to the web client without affecting availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42957",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3627998",
          "name" : "https://me.sap.com/notes/3627998",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP S/4HANA allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.9,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42955",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3611345",
          "name" : "https://me.sap.com/notes/3611345",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to a missing authorization check in SAP Cloud Connector, an attacker on an adjacent network with low privileges could send a crafted request to the endpoint responsible for testing LDAP connections. A successful exploit could lead to reduced performance, hence a low-impact on availability of the service. Confidentiality and integrity of the data are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42951",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3625403",
          "name" : "https://me.sap.com/notes/3625403",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to broken authorization, SAP Business One (SLD) allows an authenticated attacker to gain administrator privileges of a database by invoking the corresponding API.?As a result , it has a high impact on the confidentiality, integrity, and availability of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42950",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3633838",
          "name" : "https://me.sap.com/notes/3633838",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP Landscape Transformation (SLT) allows an attacker with user privileges to exploit a vulnerability in the function module exposed via RFC. This flaw enables the injection of arbitrary ABAP code into the system, bypassing essential authorization checks. This vulnerability effectively functions as a backdoor, creating the risk of full system compromise, undermining the confidentiality, integrity and availability of the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.9,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42949",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3626722",
          "name" : "https://me.sap.com/notes/3626722",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to a missing authorization check in the ABAP Platform, an authenticated user with elevated privileges could bypass authorization restrictions for common transactions by leveraging the SQL Console. This could enable an attacker to access and read the contents of database tables without proper authorization, leading to a significant compromise of data confidentiality. However, the integrity and availability of the system remain unaffected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42948",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3629871",
          "name" : "https://me.sap.com/notes/3629871",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to a Cross-Site Scripting (XSS) vulnerability in SAP NetWeaver ABAP Platform, an unauthenticated attacker could generate a malicious link and make it publicly accessible. If an authenticated user clicks on this link, the injected input is processed during the website?s page generation, resulting in the creation of malicious content. When this malicious content gets executed, the attacker could gain the ability to access/modify information within the scope of victim?s browser."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42946",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3614804",
          "name" : "https://me.sap.com/notes/3614804",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to directory traversal vulnerability in SAP S/4HANA (Bank Communication Management), an attacker with high privileges and access to a specific transaction and method in Bank Communication Management could gain unauthorized access to sensitive operating system files. This could allow the attacker to potentially read or delete these files hence causing a high impact on confidentiality and low impact on integrity. There is no impact on availability of the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42945",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3585491",
          "name" : "https://me.sap.com/notes/3585491",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server ABAP has HTML injection vulnerability. Due to this, an attacker could craft a URL with malicious script as payload and trick a victim with active user session into executing it. Upon successful exploit, this vulnerability could lead to limited access to data or its manipulation. There is no impact on availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42943",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3627845",
          "name" : "https://me.sap.com/notes/3627845",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP GUI for Windows may allow the leak of NTML hashes when specific ABAP frontend services are called with UNC paths. For a successful attack, the attacker needs developer authorization in a specific Application Server ABAP to make changes in the code, and the victim needs to execute by using SAP GUI for Windows. This could trigger automatic NTLM authentication, potentially exposing hashed credentials to an attacker. As a result, it has a high impact on the confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42942",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3597355",
          "name" : "https://me.sap.com/notes/3597355",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server for ABAP has cross-site scripting vulnerability. Due to this, an unauthenticated attacker could craft a URL embedded with malicious script and trick an unauthenticated victim to click on it to execute the script. Upon successful exploitation, the attacker could access and modify limited information within the scope of victim's browser. This vulnerability has no impact on availability of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42941",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1022"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3624943",
          "name" : "https://me.sap.com/notes/3624943",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP Fiori (Launchpad) is vulnerable to Reverse Tabnabbing vulnerability due to inadequate external navigation protections for its link (<a>) elements. An attacker with administrative user privileges could exploit this by leveraging compromised or malicious pages. While administrative access is necessary for certain configurations, the attacker does not need the administrative privileges to execute the attack. This could result in unintended manipulation of user sessions or exposure of sensitive information. The issue impacts the confidentiality and integrity of the system, but the availability remains unaffected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42936",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3602656",
          "name" : "https://me.sap.com/notes/3602656",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SAP NetWeaver Application Server for ABAP does not enable an administrator to assign distinguished authorizations for different user roles, this issue allows authenticated users to access restricted objects in the barcode interface, leading to privilege escalation. This results in a low impact on the confidentiality and integrity of the application, there is no impact on availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42935",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3601480",
          "name" : "https://me.sap.com/notes/3601480",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SAP NetWeaver Application Server ABAP and ABAP Platform Internet Communication Manager (ICM) permits authorized users with admin privileges and local access to log files to read sensitive information, resulting in information disclosure. This leads to high impact on the confidentiality of the application, with no impact on integrity or availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-42934",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-113"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3616863",
          "name" : "https://me.sap.com/notes/3616863",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP S/4HANA Supplier invoice is vulnerable to CRLF Injection. An attacker with user-level privileges can bypass the allowlist and insert untrusted sites into the 'Trusted Sites' configuration by injecting line feed (LF) characters into application inputs. This vulnerability has a low impact on the application's integrity and no impact on confidentiality or availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-12T03:15Z",
    "lastModifiedDate" : "2025-08-12T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55161",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-ff33-grr6-rmvp",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-ff33-grr6-rmvp",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/markdown/pdf endpoint to convert Markdown to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T23:15Z",
    "lastModifiedDate" : "2025-08-15T18:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55159",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8",
          "name" : "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/tokio-rs/slab/pull/152",
          "name" : "https://github.com/tokio-rs/slab/pull/152",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv",
          "name" : "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T23:15Z",
    "lastModifiedDate" : "2025-08-11T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55158",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-415"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vim/vim/commit/9772025d24e939fd84b85748ce35c26874c05775",
          "name" : "https://github.com/vim/vim/commit/9772025d24e939fd84b85748ce35c26874c05775",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/releases/tag/v9.1.1406",
          "name" : "https://github.com/vim/vim/releases/tag/v9.1.1406",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-5fg8-wvx3-583x",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-5fg8-wvx3-583x",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1406, when processing nested tuples during Vim9 script import operations, an error during evaluation can trigger a double-free in Vim’s internal typed value (typval_T) management. Specifically, the clear_tv() function may attempt to free memory that has already been deallocated, due to improper lifetime handling in the handle_import / ex_import code paths. The vulnerability can only be triggered if a user explicitly opens and executes a specially crafted Vim script. This issue has been patched in version 9.1.1406."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.1.1231",
          "versionEndExcluding" : "9.1.1406",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T23:15Z",
    "lastModifiedDate" : "2025-08-12T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55157",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vim/vim/commit/1307743697bbc46e1518abfea7f89caa95bcaf97",
          "name" : "https://github.com/vim/vim/commit/1307743697bbc46e1518abfea7f89caa95bcaf97",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/releases/tag/v9.1.1400",
          "name" : "https://github.com/vim/vim/releases/tag/v9.1.1400",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-3r4f-mm4w-wgg6",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-3r4f-mm4w-wgg6",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vim is an open source, command line text editor. In versions from 9.1.1231 to before 9.1.1400, When processing nested tuples in Vim script, an error during evaluation can trigger a use-after-free in Vim’s internal tuple reference management. Specifically, the tuple_unref() function may access already freed memory due to improper lifetime handling, leading to memory corruption. The exploit requires direct user interaction, as the script must be explicitly executed within Vim. This issue has been patched in version 9.1.1400."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.1.1231",
          "versionEndExcluding" : "9.1.1400",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T23:15Z",
    "lastModifiedDate" : "2025-08-12T18:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55156",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271",
          "name" : "https://github.com/pyload/pyload/blob/develop/src/pyload/core/database/file_database.py#L271",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f",
          "name" : "https://github.com/pyload/pyload/commit/134edcdf6e2a10c393743c254da3d9d90b74258f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf",
          "name" : "https://github.com/pyload/pyload/security/advisories/GHSA-pwh4-6r3m-j2rf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "pyLoad is the free and open-source Download Manager written in pure Python. Prior to version 0.5.0b3.dev91, the parameter add_links in API /json/add_package is vulnerable to SQL Injection. Attackers can modify or delete data in the database, causing data errors or loss. This issue has been patched in version 0.5.0b3.dev91."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T23:15Z",
    "lastModifiedDate" : "2025-08-11T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55151",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-76hv-h7g2-xfv3",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-76hv-h7g2-xfv3",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, the \"convert file to pdf\" functionality (/api/v1/convert/file/pdf) uses LibreOffice's unoconvert tool for conversion, and SSRF vulnerabilities exist during the conversion process. This issue has been patched in version 1.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T22:15Z",
    "lastModifiedDate" : "2025-08-15T18:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55150",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/commit/7d6b70871bad2a3ff810825f7382c49f55293943",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xw8v-9mfm-g2pm",
          "name" : "https://github.com/Stirling-Tools/Stirling-PDF/security/advisories/GHSA-xw8v-9mfm-g2pm",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stirling-PDF is a locally hosted web application that performs various operations on PDF files. Prior to version 1.1.0, when using the /api/v1/convert/html/pdf endpoint to convert HTML to PDF, the backend calls a third-party tool to process it and includes a sanitizer for security sanitization which can be bypassed and result in SSRF. This issue has been patched in version 1.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:stirlingpdf:stirling_pdf:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T22:15Z",
    "lastModifiedDate" : "2025-08-15T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55012",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zed-industries/zed/security/advisories/GHSA-x34m-39xw-g2wr",
          "name" : "https://github.com/zed-industries/zed/security/advisories/GHSA-x34m-39xw-g2wr",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Zed is a multiplayer code editor. Prior to version 0.197.3, in the Zed Agent Panel allowed for an AI agent to achieve Remote Code Execution (RCE) by bypassing user permission checks. An AI Agent could have exploited a permissions bypass vulnerability to create or modify a project-specific configuration file, leading to the execution of arbitrary commands on a victim's machine without the explicit approval that would otherwise be required. This vulnerability has been patched in version 0.197.3. A workaround for this issue involves either avoid sending prompts to the Agent Panel, or to limit the AI Agent's file system access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T22:15Z",
    "lastModifiedDate" : "2025-08-11T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54992",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/telstra/open-kilda/commit/1eddb4983a6287d083e3e99a56dc4c291abd347e",
          "name" : "https://github.com/telstra/open-kilda/commit/1eddb4983a6287d083e3e99a56dc4c291abd347e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/telstra/open-kilda/pull/5778",
          "name" : "https://github.com/telstra/open-kilda/pull/5778",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/telstra/open-kilda/security/advisories/GHSA-43rg-6r66-6hr7",
          "name" : "https://github.com/telstra/open-kilda/security/advisories/GHSA-43rg-6r66-6hr7",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenKilda is an open-source OpenFlow controller. Prior to version 1.164.0, an XML external entity (XXE) injection vulnerability was found in OpenKilda which in combination with GHSL-2025-024 allows unauthenticated attackers to exfiltrate information from the instance where the OpenKilda UI is running. This issue may lead to Information disclosure. This issue has been patched in version 1.164.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T22:15Z",
    "lastModifiedDate" : "2025-08-11T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25235",
        "ASSIGNER" : "security@omnissa.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.omnissa.com/omsa-2025-0003/",
          "name" : "https://www.omnissa.com/omsa-2025-0003/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-Side Request Forgery (SSRF) in Omnissa Secure Email Gateway (SEG) in SEG prior to 2.32 running on Windows and SEG prior to 2503 running on UAG allows routing of network traffic such as HTTP requests to internal networks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T22:15Z",
    "lastModifiedDate" : "2025-08-11T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54878",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nasa/CryptoLib/commit/9b5b294ec09da450d2d4d05aea2db604ead48be1",
          "name" : "https://github.com/nasa/CryptoLib/commit/9b5b294ec09da450d2d4d05aea2db604ead48be1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/nasa/CryptoLib/security/advisories/GHSA-9qph-pxfm-q9g4",
          "name" : "https://github.com/nasa/CryptoLib/security/advisories/GHSA-9qph-pxfm-q9g4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CryptoLib provides a software-only solution using the CCSDS Space Data Link Security Protocol - Extended Procedures (SDLS-EP) to secure communications between a spacecraft running the core Flight System (cFS) and a ground station. A heap buffer overflow vulnerability exists in NASA CryptoLib version 1.4.0 and prior in the IV setup logic for telecommand frames. The problem arises from missing bounds checks when copying the Initialization Vector (IV) into a freshly allocated buffer. An attacker can supply a crafted TC frame that causes the library to write one byte past the end of the heap buffer, leading to heap corruption and undefined behaviour. An attacker supplying a malformed telecommand frame can corrupt heap memory. This leads to undefined behaviour, which could manifest itself as a crash (denial of service) or more severe exploitation. This issue has been patched in version 1.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T21:15Z",
    "lastModifiedDate" : "2025-08-11T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-40920",
        "ASSIGNER" : "cve-request@security.metacpan.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://datatracker.ietf.org/doc/html/rfc7616#section-5.12",
          "name" : "https://datatracker.ietf.org/doc/html/rfc7616#section-5.12",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://datatracker.ietf.org/doc/html/rfc9562#name-security-considerations",
          "name" : "https://datatracker.ietf.org/doc/html/rfc9562#name-security-considerations",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/commit/ad2c03aad95406db4ce35dfb670664ebde004c18.patch",
          "name" : "https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/commit/ad2c03aad95406db4ce35dfb670664ebde004c18.patch",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/pull/1",
          "name" : "https://github.com/perl-catalyst/Catalyst-Authentication-Credential-HTTP/pull/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://metacpan.org/release/ETHER/Catalyst-Authentication-Credential-HTTP-1.018/source/lib/Catalyst/Authentication/Credential/HTTP.pm#L391",
          "name" : "https://metacpan.org/release/ETHER/Catalyst-Authentication-Credential-HTTP-1.018/source/lib/Catalyst/Authentication/Credential/HTTP.pm#L391",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Catalyst::Authentication::Credential::HTTP versions 1.018 and earlier for Perl generate nonces using the Perl Data::UUID library.  *  Data::UUID does not use a strong cryptographic source for generating UUIDs.\n  *  Data::UUID returns v3 UUIDs, which are generated from known information and are unsuitable for security, as per RFC 9562.\n  *  The nonces should be generated from a strong cryptographic source, as per RFC 7616."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T21:15Z",
    "lastModifiedDate" : "2025-08-11T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-32640",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.2.8",
          "name" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.2.8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.3.13",
          "name" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.3.13",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.4.6",
          "name" : "https://github.com/MasaCMS/MasaCMS/releases/tag/7.4.6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-24rr-gwx3-jhqc",
          "name" : "https://github.com/MasaCMS/MasaCMS/security/advisories/GHSA-24rr-gwx3-jhqc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS",
          "name" : "https://github.com/Stuub/CVE-2024-32640-SQLI-MuraCMS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://projectdiscovery.io/blog/hacking-apple-with-sql-injection?ref=projectdiscovery-io-blog-newsletter",
          "name" : "https://projectdiscovery.io/blog/hacking-apple-with-sql-injection?ref=projectdiscovery-io-blog-newsletter",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.seebug.org/vuldb/ssvid-99835",
          "name" : "https://www.seebug.org/vuldb/ssvid-99835",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MASA CMS is an Enterprise Content Management platform based on open source technology. Versions prior to 7.4.6, 7.3.13, and 7.2.8 contain a SQL injection vulnerability in the `processAsyncObject` method that can result in remote code execution. Versions 7.4.6, 7.3.13, and 7.2.8 contain a fix for the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T21:15Z",
    "lastModifiedDate" : "2025-08-11T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8285",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create channel subscription without proper access to the channel via API call to the create channel subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7679",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authentication for Critical Function vulnerability in ABB Aspect.This issue affects Aspect: All versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7677",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authentication for Critical Function vulnerability in ABB Aspect.This issue affects Aspect: All versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54525",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to create channel subscription endpoint with an invalid request body."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54478",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to edit channel subscriptions via API call to the edit channel subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54463",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54458",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to create a subscription for a Confluence space the user does not have access to via the create subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53910",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to create a channel subscription without proper access to the channel via API call to the edit channel subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53857",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the GET autocomplete/GetChannelSubscriptions endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53514",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to server webhook endpoint with an invalid request body."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53191",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authentication for Critical Function vulnerability in ABB Aspect.This issue affects Aspect: before <3.08.04-s01."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53190",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-286"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in ABB Aspect.This issue affects Aspect: before <3.08.04-s01."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53189",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authorization Bypass Through User-Controlled Key vulnerability in ABB Aspect.This issue affects Aspect: from o before <3.08.04-s01."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53188",
        "ASSIGNER" : "cybersecurity@ch.abb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "name" : "https://search.abb.com/library/Download.aspx?DocumentID=9AKK108471A4462&LanguageCode=en&DocumentPartId=pdf&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficiently Protected Credentials vulnerability in ABB Aspect.This issue affects Aspect: before <3.08.04-s01."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52931",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to handle unexpected request body which allows attackers to crash the plugin via constant hit to update channel subscription endpoint with an invalid request body."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51824",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/libcsp/libcsp/issues/851",
          "name" : "https://github.com/libcsp/libcsp/issues/851",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/libcsp/libcsp/pull/853",
          "name" : "https://github.com/libcsp/libcsp/pull/853",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "libcsp 2.0 is vulnerable to Buffer Overflow in the csp_usart_open() function at drivers/usart/zephyr.c."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-14T16:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51823",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/libcsp/libcsp/issues/850",
          "name" : "https://github.com/libcsp/libcsp/issues/850",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/libcsp/libcsp/pull/852",
          "name" : "https://github.com/libcsp/libcsp/pull/852",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-14T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49221",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to enforce authentication of the user to the Mattermost instance which allows unauthenticated attackers to access subscription details without via API call to GET subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48731",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the Confluence space which allows attackers to edit a subscription for a Confluence space the user does not have access for via edit subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44004",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the authorization of the user to the Mattermost instance which allows attackers to create a channel subscription without proper authorization via API call to the create channel subscription endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44001",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Confluence Plugin version <1.5.0 fails to check the access of the user to the channel which allows attackers to get channel subscription details without proper access to the channel via API call to the Get Channel Subscriptions details endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25229",
        "ASSIGNER" : "security@omnissa.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.omnissa.com/omnissa-security-response/",
          "name" : "https://www.omnissa.com/omnissa-security-response/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.omnissa.com/omsa-2025-0004/",
          "name" : "https://www.omnissa.com/omsa-2025-0004/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Omnissa Workspace ONE UEM contains a Server-Side Request Forgery (SSRF) Vulnerability. A malicious actor with user privileges may be able to access restricted internal system information, potentially enabling enumeration of internal network resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T19:15Z",
    "lastModifiedDate" : "2025-08-11T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8859",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/unjoke/newvul/issues/1",
          "name" : "https://github.com/unjoke/newvul/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319399",
          "name" : "VDB-319399 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319399",
          "name" : "VDB-319399 | code-projects eBlog Site File Upload save-slider.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.628112",
          "name" : "Submit #628112 | code-projects Project Source: 1.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in code-projects eBlog Site 1.0. Affected by this vulnerability is an unknown functionality of the file /native/admin/save-slider.php of the component File Upload Module. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:eblog_site:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T15:15Z",
    "lastModifiedDate" : "2025-08-13T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8851",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.libtiff.org/",
          "name" : "http://www.libtiff.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3",
          "name" : "https://gitlab.com/libtiff/libtiff/-/commit/8a7a48d7a645992ca83062b3a1873c951661e2b3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319382",
          "name" : "VDB-319382 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319382",
          "name" : "VDB-319382 | LibTIFF tiffcrop tiffcrop.c readSeparateStripsetoBuffer stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624604",
          "name" : "https://vuldb.com/?submit.624604",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624604",
          "name" : "Submit #624604 | LibTIFF v4.5.1 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in LibTIFF up to 4.5.1. Affected by this issue is the function readSeparateStripsetoBuffer of the file tools/tiffcrop.c of the component tiffcrop. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The patch is identified as 8a7a48d7a645992ca83062b3a1873c951661e2b3. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T14:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8847",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yangzongzhuan/RuoYi/issues/298",
          "name" : "https://github.com/yangzongzhuan/RuoYi/issues/298",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yangzongzhuan/RuoYi/issues/298",
          "name" : "https://github.com/yangzongzhuan/RuoYi/issues/298",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yangzongzhuan/RuoYi/issues/298#issue-3265348205",
          "name" : "https://github.com/yangzongzhuan/RuoYi/issues/298#issue-3265348205",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319381",
          "name" : "VDB-319381 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319381",
          "name" : "VDB-319381 | yangzongzhuan RuoYi edit cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623372",
          "name" : "Submit #623372 | yangzongzhuan RuoYi <=4.8.1 cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in yangzongzhuan RuoYi up to 4.8.1. Affected by this vulnerability is the function Edit of the file /system/notice/edit. The manipulation of the argument noticeTitle/noticeContent leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T13:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8845",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392937",
          "name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392937",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392937",
          "name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392937",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/1pEQb6lcdohWV53DzPPU7kaCCNg-qAaau/view?usp=drive_link",
          "name" : "https://drive.google.com/file/d/1pEQb6lcdohWV53DzPPU7kaCCNg-qAaau/view?usp=drive_link",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319379",
          "name" : "VDB-319379 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319379",
          "name" : "VDB-319379 | NASM Netwide Assember nasm.c assemble_file stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623188",
          "name" : "Submit #623188 | nasm NASM version 2.17rc0 compiled on Jul 20 2025 and the newest master (888d9ab) Memory Corruption",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in NASM Netwide Assember 2.17rc0. This issue affects the function assemble_file of the file nasm.c. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T13:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8836",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link",
          "name" : "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4",
          "name" : "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/issues/401",
          "name" : "https://github.com/jasper-software/jasper/issues/401",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/issues/401",
          "name" : "https://github.com/jasper-software/jasper/issues/401",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319370",
          "name" : "VDB-319370 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319370",
          "name" : "VDB-319370 | JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622409",
          "name" : "Submit #622409 | JasPer  The newest master && jasper-4.2.5 Assertion Failure",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T08:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8747",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/keras-team/keras/pull/21429",
          "name" : "https://github.com/keras-team/keras/pull/21429",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability/",
          "name" : "https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability/",
          "name" : "https://jfrog.com/blog/keras-safe_mode-bypass-vulnerability/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A safe mode bypass vulnerability in the `Model.load_model` method in Keras versions 3.0.0 through 3.10.0 allows an attacker to achieve arbitrary code execution by convincing a user to load a specially crafted `.keras` model archive."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:keras:keras:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "3.0.0",
          "versionEndIncluding" : "3.10.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T08:15Z",
    "lastModifiedDate" : "2025-08-14T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8835",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1E754R-FsFkNJp9OYtu6Dqjv47uGSVP18/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1E754R-FsFkNJp9OYtu6Dqjv47uGSVP18/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52",
          "name" : "https://github.com/jasper-software/jasper/commit/bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/issues/400",
          "name" : "https://github.com/jasper-software/jasper/issues/400",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/issues/400",
          "name" : "https://github.com/jasper-software/jasper/issues/400",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772",
          "name" : "https://github.com/jasper-software/jasper/issues/400#issuecomment-3134702772",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319369",
          "name" : "VDB-319369 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319369",
          "name" : "VDB-319369 | JasPer Image Color Space Conversion jas_image.c jas_image_chclrspc null pointer dereference",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622408",
          "name" : "Submit #622408 | JasPer  The newest master && jasper-4.2.5 Null Pointer Dereference",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T07:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8829",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_45/45.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319363",
          "name" : "VDB-319363 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319363",
          "name" : "VDB-319363 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_red os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626694",
          "name" : "Submit #626694 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function um_red of the file /goform/RP_setBasicAuto. The manipulation of the argument hname leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8828",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319362",
          "name" : "VDB-319362 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319362",
          "name" : "VDB-319362 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setIpv6 ipv6cmd os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626693",
          "name" : "Submit #626693 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_44/44.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function ipv6cmd of the file /goform/setIpv6. The manipulation of the argument Ipv6PriDns/Ipv6SecDns/Ipv6StaticGateway/LanIpv6Addr/LanPrefixLen/pppoeUser/pppoePass/pppoeIdleTime/pppoeRedialPeriod/Ipv6in4_PrefixLen/LocalIpv6/RemoteIpv4/LanIPv6_Prefix/LanPrefixLen/ipv6to4Relay/ipv6rdRelay/tunrd_PrefixLen/wan_UseLinkLocal/Ipv6StaticIp/Ipv6PrefixLen leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8827",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319361",
          "name" : "VDB-319361 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319361",
          "name" : "VDB-319361 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto um_inspect_cross_band os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626692",
          "name" : "Submit #626692 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_43/43.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function um_inspect_cross_band of the file /goform/RP_setBasicAuto. The manipulation of the argument staticGateway leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27577",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27562",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27536",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through type confusion."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27128",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-26690",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25278",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-08.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through race condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25212",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through  improper input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24925",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24844",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through missing release of memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-24298",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-07.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker arbitrary code execution in tcb through use after free."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-11T04:15Z",
    "lastModifiedDate" : "2025-08-12T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8825",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319359",
          "name" : "VDB-319359 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319359",
          "name" : "VDB-319359 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasicAuto os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626690",
          "name" : "Submit #626690 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_41/41.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function RP_setBasicAuto of the file /goform/RP_setBasicAuto. The manipulation of the argument staticIp/staticNetmask leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T03:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8824",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319358",
          "name" : "VDB-319358 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319358",
          "name" : "VDB-319358 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setRIP stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626689",
          "name" : "Submit #626689 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_40/40.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this issue is the function setRIP of the file /goform/setRIP. The manipulation of the argument RIPmode/RIPpasswd leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T02:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8823",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_57/57.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319357",
          "name" : "VDB-319357 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319357",
          "name" : "VDB-319357 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setDeviceName os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626687",
          "name" : "Submit #626687 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function setDeviceName of the file /goform/setDeviceName. The manipulation of the argument DeviceName leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8822",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_56/56.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319356",
          "name" : "VDB-319356 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319356",
          "name" : "VDB-319356 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode algDisable stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626686",
          "name" : "Submit #626686 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function algDisable of the file /goform/setOpMode. The manipulation of the argument opMode leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T01:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8821",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319355",
          "name" : "VDB-319355 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319355",
          "name" : "VDB-319355 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 RP_setBasic os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626685",
          "name" : "Submit #626685 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_55/55.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This issue affects the function RP_setBasic of the file /goform/RP_setBasic. The manipulation of the argument bssid leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T01:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8820",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319354",
          "name" : "VDB-319354 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319354",
          "name" : "VDB-319354 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 wirelessBasic stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626684",
          "name" : "Submit #626684 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_54/54.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This vulnerability affects the function wirelessBasic of the file /goform/wirelessBasic. The manipulation of the argument submit_SSID1 leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-11T00:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8819",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319353",
          "name" : "VDB-319353 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319353",
          "name" : "VDB-319353 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setWan stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626683",
          "name" : "Submit #626683 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002)  Type:St Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_53/53.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. This affects the function setWan of the file /goform/setWan. The manipulation of the argument staticIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8818",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_52/52.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319352",
          "name" : "VDB-319352 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319352",
          "name" : "VDB-319352 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan setDFSSetting os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626682",
          "name" : "Submit #626682 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this issue is the function setDFSSetting of the file /goform/setLan. The manipulation of the argument lanNetmask/lanIp leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T23:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8817",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_51/51.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319351",
          "name" : "VDB-319351 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319351",
          "name" : "VDB-319351 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setLan stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626681",
          "name" : "Submit #626681 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002) Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected by this vulnerability is the function setLan of the file /goform/setLan. The manipulation of the argument lan2enabled leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T22:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8816",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/Linksys1/vuln_50/50.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319350",
          "name" : "VDB-319350 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319350",
          "name" : "VDB-319350 | Linksys RE6250/RE6300/RE6350/RE6500/RE7000/RE9000 setOpMode stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626680",
          "name" : "Submit #626680 | Linksys RE6500?RE6250?RE6300?RE6350?RE7000?RE9000 RE6500(1.0.013.001)  RE6250(1.0.04.001)  RE6300(1.2.07.001)  RE6350(1.0.04.001)  RE7000(1.1.05.003)  RE9000(1.0.04.002)  Type:St Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.linksys.com/",
          "name" : "https://www.linksys.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Linksys RE6250, RE6300, RE6350, RE6500, RE7000 and RE9000 up to 20250801. Affected is the function setOpMode of the file /goform/setOpMode. The manipulation of the argument ethConv leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T16:15Z",
    "lastModifiedDate" : "2025-08-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8815",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/morning-pro/Morning/issues/ICOVAK",
          "name" : "https://gitee.com/morning-pro/Morning/issues/ICOVAK",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitee.com/morning-pro/Morning/issues/ICOVAK",
          "name" : "https://gitee.com/morning-pro/Morning/issues/ICOVAK",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319344",
          "name" : "VDB-319344 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319344",
          "name" : "VDB-319344 | ??i Morning Shiro Configuration index path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622348",
          "name" : "https://vuldb.com/?submit.622348",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622348",
          "name" : "Submit #622348 | ??i Morning up to bc782730c74ff080494f145cc363a0b4f43f7d3e Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ??i Morning up to bc782730c74ff080494f145cc363a0b4f43f7d3e. It has been classified as critical. Affected is an unknown function of the file /index of the component Shiro Configuration. The manipulation leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T16:15Z",
    "lastModifiedDate" : "2025-08-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8814",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atjiu/pybbs/commit/8aa2bb1aef3346e49aec6358edf5e47ce905ae7b",
          "name" : "https://github.com/atjiu/pybbs/commit/8aa2bb1aef3346e49aec6358edf5e47ce905ae7b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211",
          "name" : "https://github.com/atjiu/pybbs/issues/211",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777",
          "name" : "https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319343",
          "name" : "VDB-319343 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319343",
          "name" : "VDB-319343 | atjiu pybbs CookieUtil.java setCookie cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622334",
          "name" : "Submit #622334 | atjiu https://github.com/atjiu/pybbs <=6.0.0 CSRF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622353",
          "name" : "Submit #622353 | atjiu https://github.com/atjiu/pybbs <=6.0.0 CSRF (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211#issue-3256483043",
          "name" : "https://github.com/atjiu/pybbs/issues/211#issue-3256483043",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777",
          "name" : "https://github.com/atjiu/pybbs/issues/211#issuecomment-3134960777",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211#issue-3256483043",
          "name" : "https://github.com/atjiu/pybbs/issues/211#issue-3256483043",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/211",
          "name" : "https://github.com/atjiu/pybbs/issues/211",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in atjiu pybbs up to 6.0.0 and classified as problematic. This issue affects the function setCookie of the file src/main/java/co/yiiu/pybbs/util/CookieUtil.java. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is named 8aa2bb1aef3346e49aec6358edf5e47ce905ae7b. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T15:15Z",
    "lastModifiedDate" : "2025-08-12T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8813",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atjiu/pybbs/commit/edb14ff13e9e05394960ba46c3d31d844ff2deac",
          "name" : "https://github.com/atjiu/pybbs/commit/edb14ff13e9e05394960ba46c3d31d844ff2deac",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210",
          "name" : "https://github.com/atjiu/pybbs/issues/210",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210#issuecomment-3134906856",
          "name" : "https://github.com/atjiu/pybbs/issues/210#issuecomment-3134906856",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319342",
          "name" : "VDB-319342 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319342",
          "name" : "VDB-319342 | atjiu pybbs IndexController.java changeLanguage redirect",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622333",
          "name" : "Submit #622333 | atjiu https://github.com/atjiu/pybbs  <=6.0.0 Open Redirect",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210#issue-3256474679",
          "name" : "https://github.com/atjiu/pybbs/issues/210#issue-3256474679",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210#issuecomment-3134906856",
          "name" : "https://github.com/atjiu/pybbs/issues/210#issuecomment-3134906856",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210#issue-3256474679",
          "name" : "https://github.com/atjiu/pybbs/issues/210#issue-3256474679",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/210",
          "name" : "https://github.com/atjiu/pybbs/issues/210",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in atjiu pybbs up to 6.0.0 and classified as problematic. This vulnerability affects the function changeLanguage of the file src/main/java/co/yiiu/pybbs/controller/front/IndexController.java. The manipulation of the argument referer leads to open redirect. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The patch is identified as edb14ff13e9e05394960ba46c3d31d844ff2deac. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T15:15Z",
    "lastModifiedDate" : "2025-08-12T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8812",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atjiu/pybbs/commit/2fe4a51afbce0068c291bc1818bbc8f7f3b01a22",
          "name" : "https://github.com/atjiu/pybbs/commit/2fe4a51afbce0068c291bc1818bbc8f7f3b01a22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/209",
          "name" : "https://github.com/atjiu/pybbs/issues/209",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651",
          "name" : "https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319341",
          "name" : "VDB-319341 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319341",
          "name" : "VDB-319341 | atjiu pybbs Admin Panel settings cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622331",
          "name" : "Submit #622331 | atjiu https://github.com/atjiu/pybbs  <=6.0.0 Stored XSS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651",
          "name" : "https://github.com/atjiu/pybbs/issues/209#issuecomment-3134772651",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/atjiu/pybbs/issues/209",
          "name" : "https://github.com/atjiu/pybbs/issues/209",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in atjiu pybbs up to 6.0.0. This affects an unknown part of the file /api/settings of the component Admin Panel. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 2fe4a51afbce0068c291bc1818bbc8f7f3b01a22. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T14:15Z",
    "lastModifiedDate" : "2025-08-12T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8811",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Darlingzero2/cve/issues/3",
          "name" : "https://github.com/Darlingzero2/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/Darlingzero2/cve/issues/3",
          "name" : "https://github.com/Darlingzero2/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319340",
          "name" : "VDB-319340 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319340",
          "name" : "VDB-319340 | code-projects Simple Art Gallery registration.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627395",
          "name" : "Submit #627395 | code-projects Simple Art Gallery V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in code-projects Simple Art Gallery 1.0. Affected by this issue is some unknown functionality of the file /Admin/registration.php. The manipulation of the argument fname leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:simple_art_gallery:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-10T14:15Z",
    "lastModifiedDate" : "2025-08-13T14:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8810",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LaiwanHundun/CVE/blob/main/cve1",
          "name" : "https://github.com/LaiwanHundun/CVE/blob/main/cve1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/LaiwanHundun/CVE/blob/main/cve1",
          "name" : "https://github.com/LaiwanHundun/CVE/blob/main/cve1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319339",
          "name" : "VDB-319339 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319339",
          "name" : "VDB-319339 | Tenda AC20 SetFirewallCfg strcpy stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627394",
          "name" : "Submit #627394 | Tenda AC20 V1.0re_V16.03.08.05 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Tenda AC20 16.03.08.05. Affected by this vulnerability is the function strcpy of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac20_firmware:16.03.08.05:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac20:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T14:15Z",
    "lastModifiedDate" : "2025-08-14T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8809",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Find33-3/cve/issues/1",
          "name" : "https://github.com/Find33-3/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319338",
          "name" : "VDB-319338 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319338",
          "name" : "VDB-319338 | code-projects Online Medicine Guide addelidetails.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.627335",
          "name" : "Submit #627335 | code-projects Online Medicine Guide  V1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Find33-3/cve/issues/1",
          "name" : "https://github.com/Find33-3/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Online Medicine Guide 1.0. Affected is an unknown function of the file /addelidetails.php. The manipulation of the argument del leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:online_medicine_guide:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-10T13:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8807",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/N1n3b9S/cve/issues/15",
          "name" : "https://github.com/N1n3b9S/cve/issues/15",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/15",
          "name" : "https://github.com/N1n3b9S/cve/issues/15",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/15#issue-3280910303",
          "name" : "https://github.com/N1n3b9S/cve/issues/15#issue-3280910303",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319336",
          "name" : "VDB-319336 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319336",
          "name" : "VDB-319336 | xujeff tianti ?? save authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626344",
          "name" : "Submit #626344 | Tianti Project Tianti 2.3 Missing Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in xujeff tianti ?? up to 2.3. It has been declared as critical. This vulnerability affects unknown code of the file /tianti-module-admin/user/ajax/save. The manipulation leads to missing authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T12:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8805",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/commit/c58b8f081986aaf2a312d73a0a17985518b47fe6",
          "name" : "https://github.com/open5gs/open5gs/commit/c58b8f081986aaf2a312d73a0a17985518b47fe6",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/4000",
          "name" : "https://github.com/open5gs/open5gs/issues/4000",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/4000#issuecomment-3091321920",
          "name" : "https://github.com/open5gs/open5gs/issues/4000#issuecomment-3091321920",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/user-attachments/files/21229739/smf_crash.zip",
          "name" : "https://github.com/user-attachments/files/21229739/smf_crash.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319334",
          "name" : "VDB-319334 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319334",
          "name" : "VDB-319334 | Open5GS SMF gsm-sm.c smf_gsm_state_wait_pfcp_deletion denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626125",
          "name" : "Submit #626125 | Open5GS <= v2.7.5  Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/4000#issuecomment-3091321920",
          "name" : "https://github.com/open5gs/open5gs/issues/4000#issuecomment-3091321920",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/4000",
          "name" : "https://github.com/open5gs/open5gs/issues/4000",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Open5GS up to 2.7.5. Affected by this issue is the function smf_gsm_state_wait_pfcp_deletion of the file src/smf/gsm-sm.c of the component SMF. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is identified as c58b8f081986aaf2a312d73a0a17985518b47fe6. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T11:15Z",
    "lastModifiedDate" : "2025-08-15T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8804",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3950",
          "name" : "https://github.com/open5gs/open5gs/issues/3950",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3950#issuecomment-3034693457",
          "name" : "https://github.com/open5gs/open5gs/issues/3950#issuecomment-3034693457",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/user-attachments/files/21030801/newdata_for_ngap.zip",
          "name" : "https://github.com/user-attachments/files/21030801/newdata_for_ngap.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8804",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8804",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319333",
          "name" : "VDB-319333 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319333",
          "name" : "VDB-319333 | Open5GS AMF ngap_build_downlink_nas_transport assertion",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.625698",
          "name" : "Submit #625698 | Open5GS <= v2.7.5  Denial of Service (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626124",
          "name" : "Submit #626124 | Open5GS <=v2.7.5 Denail of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/bca0a7b6e01d254f4223b83831162566d4626428",
          "name" : "https://github.com/open5gs/open5gs/commit/bca0a7b6e01d254f4223b83831162566d4626428",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3950",
          "name" : "https://github.com/open5gs/open5gs/issues/3950",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Open5GS up to 2.7.5. Affected by this vulnerability is the function ngap_build_downlink_nas_transport of the component AMF. The manipulation leads to reachable assertion. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The identifier of the patch is bca0a7b6e01d254f4223b83831162566d4626428. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T10:15Z",
    "lastModifiedDate" : "2025-08-15T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8803",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3948",
          "name" : "https://github.com/open5gs/open5gs/issues/3948",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3948#issuecomment-3030223641",
          "name" : "https://github.com/open5gs/open5gs/issues/3948#issuecomment-3030223641",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319332",
          "name" : "VDB-319332 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319332",
          "name" : "VDB-319332 | Open5GS AMF gmm-sm.c gmm_state_exception denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626123",
          "name" : "Submit #626123 | Open5GS <= v2.7.5  Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/1f30edac27f69f61cff50162e980fe58fdeb30ca",
          "name" : "https://github.com/open5gs/open5gs/commit/1f30edac27f69f61cff50162e980fe58fdeb30ca",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3948",
          "name" : "https://github.com/open5gs/open5gs/issues/3948",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Open5GS up to 2.7.5. Affected is the function gmm_state_de_registered/gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to launch the attack remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 1f30edac27f69f61cff50162e980fe58fdeb30ca. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T10:15Z",
    "lastModifiedDate" : "2025-08-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8802",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3978",
          "name" : "https://github.com/open5gs/open5gs/issues/3978",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/user-attachments/files/21104269/5G_SMF.AMF_crash.zip",
          "name" : "https://github.com/user-attachments/files/21104269/5G_SMF.AMF_crash.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8802",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8802",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319330",
          "name" : "VDB-319330 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319330",
          "name" : "VDB-319330 | Open5GS SMF smf-sm.c smf_state_operational denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626122",
          "name" : "Submit #626122 | Open5GS <=v2.7.5 Denail of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/f168f7586a4fa536cee95ae60ac437d997f15b97",
          "name" : "https://github.com/open5gs/open5gs/commit/f168f7586a4fa536cee95ae60ac437d997f15b97",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3978",
          "name" : "https://github.com/open5gs/open5gs/issues/3978",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was determined in Open5GS up to 2.7.5. This vulnerability affects the function smf_state_operational of the file src/smf/smf-sm.c of the component SMF. The manipulation of the argument stream leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version v2.7.6 is able to address this issue. The patch is identified as f168f7586a4fa536cee95ae60ac437d997f15b97. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T09:15Z",
    "lastModifiedDate" : "2025-08-15T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8801",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3977",
          "name" : "https://github.com/open5gs/open5gs/issues/3977",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3977#issuecomment-3052575886",
          "name" : "https://github.com/open5gs/open5gs/issues/3977#issuecomment-3052575886",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/user-attachments/files/21095572/nudm-sdm.zip",
          "name" : "https://github.com/user-attachments/files/21095572/nudm-sdm.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8801",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8801",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319329",
          "name" : "VDB-319329 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319329",
          "name" : "VDB-319329 | Open5GS AMF gmm-sm.c gmm_state_exception denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626118",
          "name" : "Submit #626118 | Open5GS <=v2.7.5 Denail of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/f47f2bd4f7274295c5fbb19e2f806753d183d09a",
          "name" : "https://github.com/open5gs/open5gs/commit/f47f2bd4f7274295c5fbb19e2f806753d183d09a",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3977",
          "name" : "https://github.com/open5gs/open5gs/issues/3977",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Open5GS up to 2.7.5. This affects the function gmm_state_exception of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The identifier of the patch is f47f2bd4f7274295c5fbb19e2f806753d183d09a. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T09:15Z",
    "lastModifiedDate" : "2025-08-15T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8800",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3980",
          "name" : "https://github.com/open5gs/open5gs/issues/3980",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3980#issuecomment-3054894281",
          "name" : "https://github.com/open5gs/open5gs/issues/3980#issuecomment-3054894281",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8800",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8800",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319328",
          "name" : "VDB-319328 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319328",
          "name" : "VDB-319328 | Open5GS AMF esm-handler.c esm_handle_pdn_connectivity_request denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626113",
          "name" : "Submit #626113 | N/A Open5GS <= v2.7.5 Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/701505102f514cbde2856cd2ebc9bedb7efc820d",
          "name" : "https://github.com/open5gs/open5gs/commit/701505102f514cbde2856cd2ebc9bedb7efc820d",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3980",
          "name" : "https://github.com/open5gs/open5gs/issues/3980",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Open5GS up to 2.7.5. Affected by this issue is the function esm_handle_pdn_connectivity_request of the file src/mme/esm-handler.c of the component AMF Component. The manipulation leads to denial of service. The attack may be launched remotely. Upgrading to version 2.7.6 is able to address this issue. The name of the patch is 701505102f514cbde2856cd2ebc9bedb7efc820d. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T08:15Z",
    "lastModifiedDate" : "2025-08-15T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8799",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/issues/3979",
          "name" : "https://github.com/open5gs/open5gs/issues/3979",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3979#issuecomment-3054369376",
          "name" : "https://github.com/open5gs/open5gs/issues/3979#issuecomment-3054369376",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "name" : "https://github.com/open5gs/open5gs/releases/tag/v2.7.6",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/user-attachments/files/21104682/5g_amf_crash_ran.zip",
          "name" : "https://github.com/user-attachments/files/21104682/5g_amf_crash_ran.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8799",
          "name" : "https://github.com/ZHENGHAOHELLO/BugReport/blob/main/CVE-2025-8799",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319327",
          "name" : "VDB-319327 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319327",
          "name" : "VDB-319327 | Open5GS AMF npcf-build.c amf_nsmf_pdusession_build_create_sm_context denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.626112",
          "name" : "Submit #626112 | Open5GS <=v2.7.5 Denail of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/commit/cf63dd63197bf61a4b041aa364ba6a6199ab15e4",
          "name" : "https://github.com/open5gs/open5gs/commit/cf63dd63197bf61a4b041aa364ba6a6199ab15e4",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3979",
          "name" : "https://github.com/open5gs/open5gs/issues/3979",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in Open5GS up to 2.7.5. Affected by this vulnerability is the function amf_npcf_am_policy_control_build_create/amf_nsmf_pdusession_build_create_sm_context of the file src/amf/npcf-build.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.7.6 is able to address this issue. The patch is named cf63dd63197bf61a4b041aa364ba6a6199ab15e4. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-10T08:15Z",
    "lastModifiedDate" : "2025-08-15T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8798",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme08.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme08.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme08.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme08.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319326",
          "name" : "VDB-319326 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319326",
          "name" : "VDB-319326 | oitcode samarium Create Product product unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.626077",
          "name" : "Submit #626077 | Open-Source Samarium Business Management System 0.9.6 Stored XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in oitcode samarium up to 0.9.6. It has been classified as critical. Affected is an unknown function of the file /dashboard/product of the component Create Product Page. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T07:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8797",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319325",
          "name" : "VDB-319325 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319325",
          "name" : "VDB-319325 | LitmusChaos Litmus LocalStorage permission",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625991",
          "name" : "Submit #625991 | Open-Source LitmusChaos  3.19.0 Privilege Escalation via Manipulation of localStorage",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme07.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625991",
          "name" : "https://vuldb.com/?submit.625991",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in LitmusChaos Litmus up to 3.19.0 and classified as critical. This issue affects some unknown processing of the component LocalStorage Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T07:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8796",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319324",
          "name" : "VDB-319324 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319324",
          "name" : "VDB-319324 | LitmusChaos Litmus Delete Request delete_project authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625989",
          "name" : "Submit #625989 | Open-Source LitmusChaos 3.19.0 Unauthorized Project Deletion via Missing Authorization Checks",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme06.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625989",
          "name" : "https://vuldb.com/?submit.625989",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in LitmusChaos Litmus up to 3.19.0 and classified as problematic. This vulnerability affects unknown code of the file /auth/delete_project/ of the component Delete Request Handler. The manipulation of the argument projectID leads to missing authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T06:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8795",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319323",
          "name" : "VDB-319323 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319323",
          "name" : "VDB-319323 | LitmusChaos Litmus login access control",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625984",
          "name" : "Submit #625984 | Open-Source LitmusChaos 3.19.0 Broken Access Control via Login Response Manipulation",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme05.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in LitmusChaos Litmus up to 3.19.0. This affects an unknown part of the file /auth/login. The manipulation of the argument projectID leads to improper access controls. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T06:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8794",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme04.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme04.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319322",
          "name" : "VDB-319322 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319322",
          "name" : "VDB-319322 | LitmusChaos Litmus LocalStorage authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625982",
          "name" : "Submit #625982 | Open-Source LitmusChaos 3.19.0 Authorization Bypass via LocalStorage",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme04.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme04.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in LitmusChaos Litmus up to 3.19.0. Affected by this issue is some unknown functionality of the component LocalStorage Handler. The manipulation of the argument projectID leads to authorization bypass. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T05:15Z",
    "lastModifiedDate" : "2025-08-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8793",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319321",
          "name" : "VDB-319321 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319321",
          "name" : "VDB-319321 | LitmusChaos Litmus resource injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625956",
          "name" : "Submit #625956 | Open-Source LitmusChaos  3.19.0 IDOR in Project Access Control",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readme03.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in LitmusChaos Litmus up to 3.19.0. Affected by this vulnerability is an unknown functionality. The manipulation of the argument projectID leads to improper control of resource identifiers. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T04:15Z",
    "lastModifiedDate" : "2025-08-13T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8792",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319320",
          "name" : "VDB-319320 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319320",
          "name" : "VDB-319320 | LitmusChaos Litmus client-side enforcement of server-side security",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625952",
          "name" : "Submit #625952 | Open-Source Web LitmusChaos 3.19.0 Input Validation Bypass",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/README02.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in LitmusChaos Litmus up to 3.19.0. Affected is an unknown function. The manipulation leads to client-side enforcement of server-side security. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T04:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8791",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readmi1.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readmi1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319319",
          "name" : "VDB-319319 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319319",
          "name" : "VDB-319319 | LitmusChaos Litmus list_projects improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625949",
          "name" : "Submit #625949 | Open-Source Web LitmusChaos 3.19.0 Privilege Chaining",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readmi1.md",
          "name" : "https://github.com/MaiqueSilva/VulnDB/blob/main/readmi1.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in LitmusChaos Litmus up to 3.19.0. It has been rated as critical. This issue affects some unknown processing of the file /auth/list_projects. The manipulation of the argument role leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T04:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52136",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.emqx.com/en/emqx/latest/dashboard/introduction.html",
          "name" : "https://docs.emqx.com/en/emqx/latest/dashboard/introduction.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.emqx.com/en/emqx/latest/deploy/install-docker.html",
          "name" : "https://docs.emqx.com/en/emqx/latest/deploy/install-docker.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ricardojoserf/emqx-RCE",
          "name" : "https://github.com/ricardojoserf/emqx-RCE",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ricardojoserf/emqx-RCE",
          "name" : "https://github.com/ricardojoserf/emqx-RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In EMQX before 5.8.6, administrators can install arbitrary novel plugins via the Dashboard web interface. NOTE: the Supplier's position is that this is the intended behavior; however, 5.8.6 adds a defense-in-depth feature in which a plugin's acceptability (for later Dashboard installation) is set by the \"emqx ctl plugins allow\" CLI command."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T04:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8790",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319318",
          "name" : "VDB-319318 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319318",
          "name" : "VDB-319318 | Portabilis i-Educar API Endpoint pessoa improper authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.625918",
          "name" : "Submit #625918 | Portabilis i-Educar 2.10.0 Exposure of Private Personal Information to an Unauthorized Acto",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8790.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.625918",
          "name" : "https://vuldb.com/?submit.625918",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar up to 2.9.0. It has been declared as critical. This vulnerability affects unknown code of the file /module/Api/pessoa of the component API Endpoint. The manipulation of the argument ID leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.9.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T03:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8789",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319317",
          "name" : "VDB-319317 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319317",
          "name" : "VDB-319317 | Portabilis i-Educar API Endpoint Diario authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.625917",
          "name" : "Submit #625917 | Portabilis i-Educar 2.10.0 Authorization Bypass",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8789.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.625917",
          "name" : "https://vuldb.com/?submit.625917",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar up to 2.9.0. It has been classified as problematic. This affects an unknown part of the file /module/Api/Diario of the component API Endpoint. The manipulation leads to authorization bypass. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.9.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T03:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8788",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aula-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20planos-de-aula-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319316",
          "name" : "VDB-319316 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319316",
          "name" : "VDB-319316 | Portabilis i-Diario Informações adicionais planos-de-aula-por-areas-de-conhecimento cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625799",
          "name" : "Submit #625799 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8788.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625799",
          "name" : "https://vuldb.com/?submit.625799",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Diario up to 1.5.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /planos-de-aula-por-areas-de-conhecimento/ of the component Informações adicionais. The manipulation of the argument Parecer/Conteúdos/Objetivos leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T03:15Z",
    "lastModifiedDate" : "2025-08-13T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8787",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8787.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-disciplina.(ID)%20in%20multiples%20parameters.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-disciplina.(ID)%20in%20multiples%20parameters.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319315",
          "name" : "VDB-319315 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319315",
          "name" : "VDB-319315 | Portabilis i-Diario Registro das atividades registros-de-conteudos-por-disciplina cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625795",
          "name" : "https://vuldb.com/?submit.625795",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625795",
          "name" : "Submit #625795 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Portabilis i-Diario up to 1.5.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /registros-de-conteudos-por-disciplina/ of the component Registro das atividades. The manipulation of the argument Registro de atividades/Conteúdos leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8786",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8786.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8786.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8786.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/CVE-2025-8786.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-diario/Stored%20XSS%20endpoint%20registros-de-conteudos-por-areas-de-conhecimento.(ID)%20in%20multiples%20parameters.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319314",
          "name" : "VDB-319314 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319314",
          "name" : "VDB-319314 | Portabilis i-Diario Registro das atividades registros-de-conteudos-por-areas-de-conhecimento cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625794",
          "name" : "https://vuldb.com/?submit.625794",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625794",
          "name" : "Submit #625794 | Portabilis i-diario 1.5.0 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Portabilis i-Diario up to 1.5.0. Affected is an unknown function of the file /registros-de-conteudos-por-areas-de-conhecimento/ of the component Registro das atividades. The manipulation of the argument Registro de atividades/Conteúdos leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-10T01:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8785",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8785.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected_XSS_endpoint_educar_usuario_lst.php_parameters_nm_pessoa,_matricula_and_matricula_interna.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected_XSS_endpoint_educar_usuario_lst.php_parameters_nm_pessoa,_matricula_and_matricula_interna.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319313",
          "name" : "VDB-319313 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.319313",
          "name" : "VDB-319313 | Portabilis i-Educar educar_usuario_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.625788",
          "name" : "Submit #625788 | Portabilis i-educar 2.9 Cross Site Scripting (XSS) Reflected",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar up to 2.9. This issue affects some unknown processing of the file /intranet/educar_usuario_lst.php. The manipulation of the argument nm_pessoa/matricula/matricula_interna leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.9.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-10T00:15Z",
    "lastModifiedDate" : "2025-08-12T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8784",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8784.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20funcionario_vinculo_cad.php%20parameter%20nome.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20funcionario_vinculo_cad.php%20parameter%20nome.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319312",
          "name" : "VDB-319312 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?id.319312",
          "name" : "VDB-319312 | Portabilis i-Educar Cadastrar Vínculo funcionario_vinculo_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.625777",
          "name" : "Submit #625777 | Portabilis i-educar 2.9 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Portabilis i-Educar up to 2.9. This vulnerability affects unknown code of the file /intranet/funcionario_vinculo_cad.php of the component Cadastrar Vínculo Page. The manipulation of the argument nome leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.9.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-09T23:15Z",
    "lastModifiedDate" : "2025-08-12T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8775",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md",
          "name" : "https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md",
          "name" : "https://github.com/nn0nkey/nn0nkey/blob/main/QYS/QYS_task.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319298",
          "name" : "VDB-319298 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319298",
          "name" : "VDB-319298 | Qiyuesuo Eelectronic Signature Platform Scheduled Task upload execute unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625551",
          "name" : "Submit #625551 | qiyuesuo electronic signature platform <=4.34 Scheduled task RCE",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625553",
          "name" : "Submit #625553 | https://www.qiyuesuo.com/ electronic signature platform <=4.34 RCE (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Qiyuesuo Eelectronic Signature Platform up to 4.34 and classified as critical. Affected by this issue is the function execute of the file /api/code/upload of the component Scheduled Task Handler. The manipulation of the argument File leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T21:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8774",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/fizz-is-on-the-way/vuls_cpu/tree/master/MSHRush",
          "name" : "https://github.com/fizz-is-on-the-way/vuls_cpu/tree/master/MSHRush",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/fizz-is-on-the-way/vuls_cpu/tree/master/MSHRush",
          "name" : "https://github.com/fizz-is-on-the-way/vuls_cpu/tree/master/MSHRush",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319297",
          "name" : "VDB-319297 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319297",
          "name" : "VDB-319297 | riscv-boom SonicBOOM L1 Data Cache timing discrepancy",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625550",
          "name" : "Submit #625550 | SonicBOOM riscv-boom V2.2.3-210-gd77c2c3f implemented in Chipyard (V1.3.0) Improper Protection of Physical Side Channels",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in riscv-boom SonicBOOM up to 2.2.3 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component L1 Data Cache Handler. The manipulation leads to observable timing discrepancy. Local access is required to approach this attack. The complexity of an attack is rather high. The exploitation appears to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T21:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8773",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/qiantx/cve/blob/main/cve6.md",
          "name" : "https://github.com/qiantx/cve/blob/main/cve6.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/qiantx/cve/blob/main/cve6.md",
          "name" : "https://github.com/qiantx/cve/blob/main/cve6.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319296",
          "name" : "VDB-319296 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319296",
          "name" : "VDB-319296 | Dinstar Monitoring Platform ??????????? login_getPasswordErrorNum.action sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.625361",
          "name" : "Submit #625361 | Shenzhen Dingxin Tongda Co. Monitoring platform 1.0 Monitoring platform",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Dinstar Monitoring Platform ??????????? 1.0. Affected is an unknown function of the file /itc/$%7BappPath%7D/login_getPasswordErrorNum.action. The manipulation of the argument userBean.loginName leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8772",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hkohi.ca/vulnerability/19",
          "name" : "https://hkohi.ca/vulnerability/19",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://hkohi.ca/vulnerability/19",
          "name" : "https://hkohi.ca/vulnerability/19",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319295",
          "name" : "VDB-319295 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319295",
          "name" : "VDB-319295 | Vinades NukeViet Module index.php server-side request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624976",
          "name" : "Submit #624976 | VINADES.,JSC NukeViet 4.5.06 Internal File Read",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Vinades NukeViet up to 4.5.06. This issue affects some unknown processing of the file /admin/index.php?language=en&nv=upload of the component Module Handler. The manipulation leads to server-side request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8764",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/linlinjava/litemall/issues/567",
          "name" : "https://github.com/linlinjava/litemall/issues/567",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/567",
          "name" : "https://github.com/linlinjava/litemall/issues/567",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/567#issue-3268166914",
          "name" : "https://github.com/linlinjava/litemall/issues/567#issue-3268166914",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319266",
          "name" : "VDB-319266 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319266",
          "name" : "VDB-319266 | linlinjava litemall upload unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623957",
          "name" : "Submit #623957 | linlinjava litemall =v1.8.0 Stored XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in linlinjava litemall up to 1.8.0. Affected is the function Upload of the file /wx/storage/upload. The manipulation of the argument File leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T19:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8756",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/TDuckCloud/tduck-platform/issues/28",
          "name" : "https://github.com/TDuckCloud/tduck-platform/issues/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/TDuckCloud/tduck-platform/issues/28",
          "name" : "https://github.com/TDuckCloud/tduck-platform/issues/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/TDuckCloud/tduck-platform/issues/28#issue-3269885235",
          "name" : "https://github.com/TDuckCloud/tduck-platform/issues/28#issue-3269885235",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319261",
          "name" : "VDB-319261 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319261",
          "name" : "VDB-319261 | TDuckCloud tduck-platform manage preHandle improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624188",
          "name" : "Submit #624188 | https://www.tduckcloud.com tduck-platform commit e71c1e5 Improper Access Controls",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in TDuckCloud tduck-platform up to 5.1 and classified as critical. Affected by this vulnerability is the function preHandle of the file /manage/ of the component com.tduck.cloud.api.web.interceptor.AuthorizationInterceptor. The manipulation leads to improper authorization. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T15:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8755",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/N1n3b9S/cve/issues/14",
          "name" : "https://github.com/N1n3b9S/cve/issues/14",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/14",
          "name" : "https://github.com/N1n3b9S/cve/issues/14",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/14#issue-3269039303",
          "name" : "https://github.com/N1n3b9S/cve/issues/14#issue-3269039303",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319253",
          "name" : "VDB-319253 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319253",
          "name" : "VDB-319253 | macrozheng mall com.macro.mall.portal.controller UmsMemberController.java detail authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.624046",
          "name" : "Submit #624046 | macrozheng mall 1.0.3 Missing Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in macrozheng mall up to 1.0.3 and classified as problematic. This issue affects the function detail of the file UmsMemberController.java of the component com.macro.mall.portal.controller. The manipulation of the argument orderId leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T14:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8753",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/linlinjava/litemall/issues/564",
          "name" : "https://github.com/linlinjava/litemall/issues/564",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/564",
          "name" : "https://github.com/linlinjava/litemall/issues/564",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/linlinjava/litemall/issues/564#issue-3267670352",
          "name" : "https://github.com/linlinjava/litemall/issues/564#issue-3267670352",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319250",
          "name" : "VDB-319250 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319250",
          "name" : "VDB-319250 | linlinjava litemall File delete path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623859",
          "name" : "Submit #623859 | linlinjava litemall <=v1.8.0 Arbitrary File Deletion",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in linlinjava litemall up to 1.8.0. Affected by this issue is the function delete of the file /admin/storage/delete of the component File Handler. The manipulation of the argument key leads to path traversal. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T14:15Z",
    "lastModifiedDate" : "2025-08-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55013",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CybercentreCanada/assemblyline/security/advisories/GHSA-75jv-vfxf-3865",
          "name" : "https://github.com/CybercentreCanada/assemblyline/security/advisories/GHSA-75jv-vfxf-3865",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/CybercentreCanada/assemblyline-service-client/commit/351414e7e96cc1f5640ae71ae51b939e8ba30900",
          "name" : "https://github.com/CybercentreCanada/assemblyline-service-client/commit/351414e7e96cc1f5640ae71ae51b939e8ba30900",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Assemblyline 4 Service Client interfaces with the API to fetch tasks and publish the result for a service in Assemblyline 4. In versions below 4.6.1.dev138, the Assemblyline 4 Service Client (task_handler.py) accepts a SHA-256 value returned by the service server and uses it directly as a local file name.A malicious or compromised server (or any MITM that can speak to client) can return a path-traversal payload such as `../../../etc/cron.d/evil` and force the client to write the downloaded bytes to an arbitrary location on disk. This is fixed in version 4.6.1.dev138."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55003",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-307"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/8340a6918f6c41d8f75b6c3845c376d9dc32ed19",
          "name" : "https://github.com/openbao/openbao/commit/8340a6918f6c41d8f75b6c3845c376d9dc32ed19",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-rxp7-9q75-vj3p",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-rxp7-9q75-vj3p",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao's Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker's ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T20:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55001",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-156"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-20-vault-ldap-mfa-enforcement-bypass-when-using-username-as-alias/76092",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc",
          "name" : "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-2q8q-8fgw-9p6p",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-2q8q-8fgw-9p6p",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao allowed the assignment of policies and MFA attribution based upon entity aliases, chosen by the underlying auth method. When the username_as_alias=true parameter in the LDAP auth method was in use, the caller-supplied username was used verbatim without normalization, allowing an attacker to bypass alias-specific MFA requirements. This issue was fixed in version 2.3.2. To work around this, remove all usage of the username_as_alias=true parameter and update any entity aliases accordingly."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T20:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55000",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-156"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/183891f8d535d5b6eb3d79fda8200cade6de99e1",
          "name" : "https://github.com/openbao/openbao/commit/183891f8d535d5b6eb3d79fda8200cade6de99e1",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-f7c3-mhj2-9pvg",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-f7c3-mhj2-9pvg",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, OpenBao's TOTP secrets engine could accept valid codes multiple times rather than strictly-once. This was caused by unexpected normalization in the underlying TOTP library. To work around, ensure that all codes are first normalized before submitting to the OpenBao endpoint. TOTP code verification is a privileged action; only trusted systems should be verifying codes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.1.0",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T20:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54999",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-203"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enumeration-in-userpass-auth-method/76095",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-21-vault-user-enumeration-in-userpass-auth-method/76095",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/4d9b5d3d6486ab9fbd5b644173fa0097015d6626",
          "name" : "https://github.com/openbao/openbao/commit/4d9b5d3d6486ab9fbd5b644173fa0097015d6626",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-hh28-h22f-8357",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-hh28-h22f-8357",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, when using OpenBao's userpass auth method, user enumeration was possible due to timing difference between non-existent users and users with stored credentials. This is independent of whether the supplied credentials were valid for the given user. This issue was fixed in version 2.3.2. To work around this issue, users may use another auth method or apply rate limiting quotas to limit the number of requests in a period of time: https://openbao.org/api-docs/system/rate-limit-quotas/."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.1.0",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T20:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54998",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-307"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc",
          "name" : "https://github.com/openbao/openbao/commit/c52795c1ef746c7f2c510f9225aa8ccbbd44f9fc",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-j3xv-7fxp-gfhx",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, attackers could bypass the automatic user lockout mechanisms in the OpenBao Userpass or LDAP auth systems. This was caused by different aliasing between pre-flight and full login request user entity alias attributions. This is fixed in version 2.3.2. To work around this issue, existing users may apply rate-limiting quotas on the authentication endpoints:, see https://openbao.org/api-docs/system/rate-limit-quotas/."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.1.0",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-12T20:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54997",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/pull/1634",
          "name" : "https://github.com/openbao/openbao/pull/1634",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/openbao/openbao/releases/tag/v2.3.2",
          "name" : "https://github.com/openbao/openbao/releases/tag/v2.3.2",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-xp75-r577-cvhp",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, some OpenBao deployments intentionally limit privileged API operators from executing system code or making network connections. However, these operators can bypass both restrictions through the audit subsystem by manipulating log prefixes. This allows unauthorized code execution and network access that violates the intended security model. This issue is fixed in version 2.3.2. To workaround, users can block access to sys/audit/* endpoints using explicit deny policies, but root operators cannot be restricted this way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T03:15Z",
    "lastModifiedDate" : "2025-08-13T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54996",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/openbao/openbao/pull/1627",
          "name" : "https://github.com/openbao/openbao/pull/1627",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/openbao/openbao/releases/tag/v2.3.2",
          "name" : "https://github.com/openbao/openbao/releases/tag/v2.3.2",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-vf84-mxrq-crqc",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-vf84-mxrq-crqc",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, accounts with access to highly-privileged identity entity systems in root namespaces were able to increase their scope directly to the root policy. While the identity system allowed adding arbitrary policies, which in turn could contain capability grants on arbitrary paths, the root policy was restricted to manual generation using unseal or recovery key shares. The global root policy was not accessible from child namespaces. This issue is fixed in version 2.3.2. To workaround this vulnerability, use of denied_parameters in any policy which has access to the affected identity endpoints (on identity entities) may be sufficient to prohibit this type of attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-09T02:15Z",
    "lastModifiedDate" : "2025-08-12T20:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8743",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Cross-Site_Scripting_(XSS)_Stored_endpoint_data_source_edit.shtm_parameter_name.md#poc",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/Cross-Site_Scripting_(XSS)_Stored_endpoint_data_source_edit.shtm_parameter_name.md#poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/Scada-LTS/CVE-2025-8743.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319239",
          "name" : "VDB-319239 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319239",
          "name" : "VDB-319239 | Scada-LTS Virtual Data Source Property data_source_edit.shtm cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623428",
          "name" : "Submit #623428 | Scada-LTS 2.7.8.1 Cross Site Scripting (XSS) Stored",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Scada-LTS up to 2.7.8.1. This affects an unknown part of the file /data_source_edit.shtm of the component Virtual Data Source Property Handler. The manipulation of the argument Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T23:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8742",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/N1n3b9S/cve/issues/12",
          "name" : "https://github.com/N1n3b9S/cve/issues/12",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319238",
          "name" : "VDB-319238 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319238",
          "name" : "VDB-319238 | macrozheng mall Admin Login excessive authentication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623319",
          "name" : "Submit #623319 | macrozheng mall 1.0.3 Improper Restriction of Excessive Authentication Attempts",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/12",
          "name" : "https://github.com/N1n3b9S/cve/issues/12",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in macrozheng mall 1.0.3. It has been rated as problematic. Affected by this issue is some unknown functionality of the component Admin Login. The manipulation leads to improper restriction of excessive authentication attempts. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T22:16Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8741",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/N1n3b9S/cve/issues/10",
          "name" : "https://github.com/N1n3b9S/cve/issues/10",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/10#issue-3262475757",
          "name" : "https://github.com/N1n3b9S/cve/issues/10#issue-3262475757",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319237",
          "name" : "VDB-319237 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319237",
          "name" : "VDB-319237 | macrozheng mall login cleartext transmission",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623318",
          "name" : "Submit #623318 | macrozheng mall 1.0.3 Cleartext Transmission of Sensitive Information",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/N1n3b9S/cve/issues/10",
          "name" : "https://github.com/N1n3b9S/cve/issues/10",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in macrozheng mall up to 1.0.3. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /admin/login. The manipulation leads to cleartext transmission of sensitive information. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T22:16Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8740",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/146",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/146",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/146#issue-3265304545",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/146#issue-3265304545",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319236",
          "name" : "VDB-319236 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319236",
          "name" : "VDB-319236 | zhenfeng13 My-Blog Category save cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623480",
          "name" : "Submit #623480 | ZHENFENG13 https://github.com/ZHENFENG13/My-Blog <=1.0.0 Stored XSS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/146",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/146",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zhenfeng13 My-Blog up to 1.0.0. It has been classified as problematic. Affected is an unknown function of the file /admin/categories/save of the component Category Handler. The manipulation of the argument categoryName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T21:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8739",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/145",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/145",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319235",
          "name" : "VDB-319235 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319235",
          "name" : "VDB-319235 | zhenfeng13 My-Blog save cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623479",
          "name" : "Submit #623479 | ZHENFENG13 https://github.com/ZHENFENG13/My-Blog <=1.0.0 CSRF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ZHENFENG13/My-Blog/issues/145",
          "name" : "https://github.com/ZHENFENG13/My-Blog/issues/145",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zhenfeng13 My-Blog up to 1.0.0 and classified as problematic. This issue affects some unknown processing of the file /admin/tags/save. The manipulation of the argument tagName leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T21:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55188",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ip7z/7zip/compare/25.00...25.01",
          "name" : "https://github.com/ip7z/7zip/compare/25.00...25.01",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/ip7z/7zip/releases/tag/25.01",
          "name" : "https://github.com/ip7z/7zip/releases/tag/25.01",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://lunbun.dev/blog/cve-2025-55188/",
          "name" : "https://lunbun.dev/blog/cve-2025-55188/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceforge.net/p/sevenzip/discussion/45797/thread/da14cd780b/",
          "name" : "https://sourceforge.net/p/sevenzip/discussion/45797/thread/da14cd780b/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/08/09/1",
          "name" : "https://www.openwall.com/lists/oss-security/2025/08/09/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://youtu.be/sWT6M1cfnwM",
          "name" : "https://youtu.be/sWT6M1cfnwM",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "7-Zip before 25.01 does not always properly handle symbolic links during extraction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "25.01",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T21:15Z",
    "lastModifiedDate" : "2025-08-18T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4796",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.28/core/speaker/Api/SpeakerController.php#L419",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.28/core/speaker/Api/SpeakerController.php#L419",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3336972/wp-event-solution/trunk/core/speaker/Api/SpeakerController.php#file0",
          "name" : "https://plugins.trac.wordpress.org/changeset/3336972/wp-event-solution/trunk/core/speaker/Api/SpeakerController.php#file0",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e0d441d-1da5-45e7-8a14-ce178099c0cc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e0d441d-1da5-45e7-8a14-ce178099c0cc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Eventin plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.0.34. This is due to the plugin not properly validating a user's identity or capability prior to updating their details like email in the 'Eventin\\Speaker\\Api\\SpeakerController::update_item' function. This makes it possible for unauthenticated attackers with contributor-level and above permissions to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.0.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-08T19:15Z",
    "lastModifiedDate" : "2025-08-13T19:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8734",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/123Qe44FaC-GP88dWNl9-6H4jLWUcXYNZ/view?usp=drive_link",
          "name" : "https://drive.google.com/file/d/123Qe44FaC-GP88dWNl9-6H4jLWUcXYNZ/view?usp=drive_link",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/akimd/bison/issues/115",
          "name" : "https://github.com/akimd/bison/issues/115",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319230",
          "name" : "VDB-319230 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319230",
          "name" : "VDB-319230 | GNU Bison scan-code.c code_free double free",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622300",
          "name" : "Submit #622300 | GNU Bison Bison the newest master(2ceaf03-Jul10 in https://cgit.git.savannah.gnu.org/cgit/bison.git) Memory Corruption Vulnerability (Double Free)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in GNU Bison up to 3.8.2. This impacts the function code_free of the file src/scan-code.c. The manipulation leads to double free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The actual existence of this vulnerability is currently in question. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T18:15Z",
    "lastModifiedDate" : "2025-08-19T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8733",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/akimd/bison/issues/113",
          "name" : "https://github.com/akimd/bison/issues/113",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/akimd/bison/issues/114",
          "name" : "https://github.com/akimd/bison/issues/114",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319229",
          "name" : "VDB-319229 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319229",
          "name" : "VDB-319229 | GNU Bison obprintf.c __obstack_vprintf_internal assertion",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622298",
          "name" : "Submit #622298 | GNU Bison Bison the newest master(2ceaf03-Jul10 in https://cgit.git.savannah.gnu.org/cgit/bison.git) Assertion Failure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.622299",
          "name" : "Submit #622299 | GNU Bison Bison the newest master(2ceaf03-Jul10 in https://cgit.git.savannah.gnu.org/cgit/bison.git) Assertion Failure (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw has been found in GNU Bison up to 3.8.2. This affects the function __obstack_vprintf_internal of the file obprintf.c. Executing manipulation can lead to reachable assertion. The attack requires local access. The exploit has been published and may be used. It is still unclear if this vulnerability genuinely exists. The issue could not be reproduced from a GNU Bison 3.8.2 tarball run in a Fedora 42 container."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T18:15Z",
    "lastModifiedDate" : "2025-08-19T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8731",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Nicholas-wei/bug-discovery/blob/main/trendnet/TPL-430AP_FW1.0.1/trendnet_several_vulns.pdf",
          "name" : "https://github.com/Nicholas-wei/bug-discovery/blob/main/trendnet/TPL-430AP_FW1.0.1/trendnet_several_vulns.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.319227",
          "name" : "VDB-319227 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.319227",
          "name" : "VDB-319227 | TRENDnet TI-G160i/TI-PG102i/TPL-430AP SSH Service default credentials",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.621749",
          "name" : "Submit #621749 | trendnet TI-G160i,TI-PG102i,TPL-430AP TI-G160i with version v1_1.0.5.S0,TI-PG102i with version v1_1.0.11, v1_1.0.13 and v1_1.0.15,TPL-430AP with version 1.0.1 Use of Default Credentials",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was identified in TRENDnet TI-G160i, TI-PG102i and TPL-430AP up to 20250724. This affects an unknown part of the component SSH Service. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The vendor explains: \"For product TI-PG102i and TI-G160i, by default, the product's remote management options are all disabled. The root account is for troubleshooting purpose and the password is encrypted. However, we will remove the root account from the next firmware release. For product TPL-430AP, the initial setup process requires user to set the password for the management GUI. Once that was done, the default password will be invalid.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T16:15Z",
    "lastModifiedDate" : "2025-08-13T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8356",
        "ASSIGNER" : "cert@xerox.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/",
          "name" : "https://horizon3.ai/attack-research/attack-blogs/from-support-ticket-to-zero-day/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf",
          "name" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Xerox FreeFlow Core version 8.0.4, an attacker can exploit a Path Traversal vulnerability to access unauthorized files on the server. This can lead to Remote Code Execution (RCE), allowing the attacker to run arbitrary commands on the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xerox:freeflow_core:8.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T16:15Z",
    "lastModifiedDate" : "2025-08-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8355",
        "ASSIGNER" : "cert@xerox.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf",
          "name" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/08/Xerox-Security-Bulletin-025-013-for-Freeflow-Core-8.0.5.pdf",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Xerox FreeFlow Core version 8.0.4, improper handling of XML input allows injection of external entities. An attacker can craft malicious XML containing references to internal URLs, this results in a Server-Side Request Forgery (SSRF)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xerox:freeflow_core:8.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-08T16:15Z",
    "lastModifiedDate" : "2025-08-14T16:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36119",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-290"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241008",
          "name" : "https://www.ibm.com/support/pages/node/7241008",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM i 7.3, 7.4, 7.5, and 7.6 is affected by an authenticated user obtaining elevated privileges with IBM Digital Certificate Manager for i (DCM) due to a web session hijacking vulnerability. An authenticated user without administrator privileges could exploit this vulnerability to perform actions in DCM as an administrator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:ibm:i:7.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:ibm:i:7.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:ibm:i:7.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:ibm:i:7.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-08T15:15Z",
    "lastModifiedDate" : "2025-08-15T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36023",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241570",
          "name" : "https://www.ibm.com/support/pages/node/7241570",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF005 and 24.0.1 through 24.0.1 IF002 could allow an authenticated user to view sensitive user and system information due to an indirect object reference through a user-controlled key."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_004:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_005:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:interim_fix_002:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-08T15:15Z",
    "lastModifiedDate" : "2025-08-15T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8088",
        "ASSIGNER" : "security@eset.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day",
          "name" : "https://www.vicarius.io/vsociety/posts/cve-2025-8088-detect-winrar-zero-day",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo",
          "name" : "https://www.vicarius.io/vsociety/posts/cve-2025-8088-mitigate-winrar-zero-day-using-srp-and-ifeo",
          "refsource" : "",
          "tags" : [ "Mitigation", "Third Party Advisory" ]
        }, {
          "url" : "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088",
          "name" : "https://www.welivesecurity.com/en/eset-research/update-winrar-tools-now-romcom-and-others-exploiting-zero-day-vulnerability/#the-discovery-of-cve-2025-8088",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage" ]
        }, {
          "url" : "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5",
          "name" : "https://www.win-rar.com/singlenewsview.html?&L=0&tx_ttnews%5Btt_news%5D=283&cHash=a64b4a8f662d3639dec8d65f47bc93c5",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A path traversal vulnerability affecting the Windows version of WinRAR allows the attackers to execute arbitrary code by crafting malicious archive files. This vulnerability was exploited in the wild and was discovered by Anton Cherepanov, Peter Košinár, and Peter Strýcek\n     from ESET."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:rarlab:winrar:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "7.13",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-08T12:15Z",
    "lastModifiedDate" : "2025-08-18T13:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48913",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
          "name" : "https://lists.apache.org/thread/f1nv488ztc0js4g5ml2v88mzkzslyh83",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "If untrusted users are allowed to configure JMS for Apache CXF, previously they could use RMI or LDAP URLs, potentially leading to code execution capabilities.  This interface is now restricted to reject those protocols, removing this possibility.\n\nUsers are recommended to upgrade to versions 3.6.8, 4.0.9 or 4.1.3, which fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.6.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.0.0",
          "versionEndExcluding" : "4.0.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:cxf:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.1.0",
          "versionEndExcluding" : "4.1.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-08T10:15Z",
    "lastModifiedDate" : "2025-08-14T19:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54951",
        "ASSIGNER" : "cve-assign@fb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pytorch/executorch/commit/cea9b23aa8ff78aff92829a466da97461cc7930c",
          "name" : "https://github.com/pytorch/executorch/commit/cea9b23aa8ff78aff92829a466da97461cc7930c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.facebook.com/security/advisories/cve-2025-54951",
          "name" : "https://www.facebook.com/security/advisories/cve-2025-54951",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A group of related buffer overflow vulnerabilities in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit cea9b23aa8ff78aff92829a466da97461cc7930c."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54950",
        "ASSIGNER" : "cve-assign@fb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pytorch/executorch/commit/b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005",
          "name" : "https://github.com/pytorch/executorch/commit/b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.facebook.com/security/advisories/cve-2025-54950",
          "name" : "https://www.facebook.com/security/advisories/cve-2025-54950",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An out-of-bounds access vulnerability in the loading of ExecuTorch models can cause the runtime to crash and potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit b6b7a16df5e7852d976d8c34c8a7e9a1b6f7d005."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54949",
        "ASSIGNER" : "cve-assign@fb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pytorch/executorch/commit/ede82493dae6d2d43f8c424e7be4721abe5242be",
          "name" : "https://github.com/pytorch/executorch/commit/ede82493dae6d2d43f8c424e7be4721abe5242be",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.facebook.com/security/advisories/cve-2025-54949",
          "name" : "https://www.facebook.com/security/advisories/cve-2025-54949",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A heap buffer overflow vulnerability in the loading of ExecuTorch models can potentially result in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit ede82493dae6d2d43f8c424e7be4721abe5242be"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30405",
        "ASSIGNER" : "cve-assign@fb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pytorch/executorch/commit/0830af8207240df8d7f35b984cdf8bc35d74fa73",
          "name" : "https://github.com/pytorch/executorch/commit/0830af8207240df8d7f35b984cdf8bc35d74fa73",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.facebook.com/security/advisories/cve-2025-30405",
          "name" : "https://www.facebook.com/security/advisories/cve-2025-30405",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An integer overflow vulnerability in the loading of ExecuTorch models can cause objects to be placed outside their allocated memory area, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit 0830af8207240df8d7f35b984cdf8bc35d74fa73."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30404",
        "ASSIGNER" : "cve-assign@fb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pytorch/executorch/commit/d158236b1dc84539c1b16843bc74054c9dcba006",
          "name" : "https://github.com/pytorch/executorch/commit/d158236b1dc84539c1b16843bc74054c9dcba006",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.facebook.com/security/advisories/cve-2025-30404",
          "name" : "https://www.facebook.com/security/advisories/cve-2025-30404",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An integer overflow vulnerability in the loading of ExecuTorch models can cause overlapping allocations, potentially resulting in code execution or other undesirable effects. This issue affects ExecuTorch prior to commit d158236b1dc84539c1b16843bc74054c9dcba006."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T23:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54787",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "name" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-8r72-224q-g9fv",
          "name" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-8r72-224q-g9fv",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. There is a vulnerability in SuiteCRM version 7.14.6 which allows unauthenticated downloads of any file from the upload-directory, as long as it is named by an ID (e.g. attachments). An unauthenticated attacker could download internal files when he discovers a valid file-ID.\nValid IDs could be brute-forced, but this is quite time-consuming as the file-IDs are usually UUIDs. This issue is fixed in version 7.14.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:7.14.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.6.0",
          "versionEndExcluding" : "8.8.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T22:15Z",
    "lastModifiedDate" : "2025-08-12T20:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53792",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53792",
          "name" : "Azure Portal Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Azure Portal Elevation of Privilege Vulnerability"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_portal:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-07T21:15Z",
    "lastModifiedDate" : "2025-08-14T17:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53787",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53787",
          "name" : "Microsoft 365 Copilot BizChat Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Microsoft 365 Copilot BizChat Information Disclosure Vulnerability"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_copilot_chat:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-07T21:15Z",
    "lastModifiedDate" : "2025-08-14T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53774",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53774",
          "name" : "Microsoft 365 Copilot BizChat Information Disclosure Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Microsoft 365 Copilot BizChat Information Disclosure Vulnerability"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:365_copilot_chat:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-07T21:15Z",
    "lastModifiedDate" : "2025-08-14T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53767",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53767",
          "name" : "Azure OpenAI Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Azure OpenAI Elevation of Privilege Vulnerability"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_openai:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 10.0,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.8
      }
    },
    "publishedDate" : "2025-08-07T21:15Z",
    "lastModifiedDate" : "2025-08-14T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45765",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/ZupeiNie/c621253068ce5b64911629534879e8f9",
          "name" : "https://gist.github.com/ZupeiNie/c621253068ce5b64911629534879e8f9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jwt/ruby-jwt/issues/668",
          "name" : "https://github.com/jwt/ruby-jwt/issues/668",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ruby-jwt v3.0.0.beta1 was discovered to contain weak encryption. NOTE: the Supplier's perspective is \"keysize is not something that is enforced by this library. Currently more recent versions of OpenSSL are enforcing some key sizes and those restrictions apply to the users of this gem also.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T21:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48709",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bmc.com",
          "name" : "https://bmc.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.bmc.com/xwiki/bin/view/Control-M-Orchestration/Control-M/ctm9021/Patches/Control-M-Server-PACTV-9-0-21-307/",
          "name" : "https://docs.bmc.com/xwiki/bin/view/Control-M-Orchestration/Control-M/ctm9021/Patches/Control-M-Server-PACTV-9-0-21-307/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in BMC Control-M 9.0.21.300. When Control-M Server has a database connection, it runs DBUStatus.exe frequently, which then calls dbu_connection_details.vbs with the username, password, database hostname, and port written in cleartext, which can be seen in event and process logs in two separate locations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47808",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gstreamer.freedesktop.org/security/",
          "name" : "https://gstreamer.freedesktop.org/security/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In GStreamer through 1.26.1, the subparse plugin's tmplayer_parse_line function may dereference a NULL pointer while parsing a subtitle file, leading to a crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47807",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gstreamer.freedesktop.org/security/",
          "name" : "https://gstreamer.freedesktop.org/security/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In GStreamer through 1.26.1, the subparse plugin's subrip_unescape_formatting function may dereference a NULL pointer while parsing a subtitle file, leading to a crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47806",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gstreamer.freedesktop.org/security/",
          "name" : "https://gstreamer.freedesktop.org/security/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In GStreamer through 1.26.1, the subparse plugin's parse_subrip_time function may write data past the bounds of a stack buffer, leading to a crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47219",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gstreamer.freedesktop.org/security/",
          "name" : "https://gstreamer.freedesktop.org/security/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_trak function may read past the end of a heap buffer while parsing an MP4 file, possibly leading to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47183",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gstreamer.freedesktop.org/security/",
          "name" : "https://gstreamer.freedesktop.org/security/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "name" : "https://github.com/atredispartners/advisories/blob/master/2025/ATREDIS-2025-0003.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In GStreamer through 1.26.1, the isomp4 plugin's qtdemux_parse_tree function may read past the end of a heap buffer while parsing an MP4 file, leading to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T20:15Z",
    "lastModifiedDate" : "2025-08-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50692",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/cyb3res3c/ceacf7d560d2c8cd5ffd158abf0bfba9",
          "name" : "https://gist.github.com/cyb3res3c/ceacf7d560d2c8cd5ffd158abf0bfba9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://reference1.example.com/index.php/admin/template_file/editFile.html",
          "name" : "https://reference1.example.com/index.php/admin/template_file/editFile.html",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://gist.github.com/cyb3res3c/ceacf7d560d2c8cd5ffd158abf0bfba9",
          "name" : "https://gist.github.com/cyb3res3c/ceacf7d560d2c8cd5ffd158abf0bfba9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "FoxCMS <=v1.2.5 is vulnerable to Code Execution in admin/template_file/editFile.html."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:foxcms:foxcms:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.2.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T19:15Z",
    "lastModifiedDate" : "2025-08-14T19:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41524",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/b9437dbec7ab539531fe44f0c26b48a2",
          "name" : "https://gist.github.com/celbahraoui/b9437dbec7ab539531fe44f0c26b48a2",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain a SQL injection vulnerability via the username parameter at index.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41523",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/b18580d4acf3e4ada6c220c7416469ed",
          "name" : "https://gist.github.com/celbahraoui/b18580d4acf3e4ada6c220c7416469ed",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain a SQL injection vulnerability via the emailAddress parameter at createClassTeacher.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41522",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/f13884670ac6668ae05b60fd37bb3521",
          "name" : "https://gist.github.com/celbahraoui/f13884670ac6668ae05b60fd37bb3521",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createStudents.php via the Id, firstname, and admissionNumber parameters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41521",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/4300aa8eb79e99f2c481cfb3a49a0cd9",
          "name" : "https://gist.github.com/celbahraoui/4300aa8eb79e99f2c481cfb3a49a0cd9",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createSessionTerm.php via the id, termId, and sessionName parameters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41520",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/39c19c0b7f9f92a1a7e06d1c928bb1c3",
          "name" : "https://gist.github.com/celbahraoui/39c19c0b7f9f92a1a7e06d1c928bb1c3",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain multiple SQL injection vulnerabilities in createClassArms.php via the classId and classArmName parameters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-41519",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/celbahraoui/412085648b1e8131aee9456e15177524",
          "name" : "https://gist.github.com/celbahraoui/412085648b1e8131aee9456e15177524",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "name" : "https://github.com/rickxy/Student-Attendance-Management-System",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Student Attendance Management System v1 was discovered to contain a cross-site scripting (XSS) vulnerability via the sessionName parameter at createSessionTerm.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:student_attendance_management_system_project:student_attendance_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T14:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7054",
        "ASSIGNER" : "cna@cloudflare.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2",
          "name" : "https://github.com/cloudflare/quiche/security/advisories/GHSA-m3hh-f9gh-74c2",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cloudflare quiche was discovered to be vulnerable to an infinite loop when sending packets containing RETIRE_CONNECTION_ID frames.\n\nQUIC connections possess a set of connection identifiers (IDs); see  Section 5.1 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-5.1 . Once the QUIC handshake completes, a local endpoint is responsible for issuing and retiring Connection IDs that are used by the remote peer to populate the Destination Connection ID field in packets sent from remote to local. Each Connection ID has a sequence number to ensure synchronization between peers.\n\nAn unauthenticated remote attacker can exploit this vulnerability by first completing a handshake and then sending a specially-crafted set of frames that trigger a connection ID retirement in the victim. When the victim attempts to send a packet containing RETIRE_CONNECTION_ID frames,  Section 19.16 of RFC 9000 https://datatracker.ietf.org/doc/html/rfc9000#section-19.6  requires that the sequence number of the retired connection ID must not be the same as the sequence number of the connection ID used by the packet. In other words, a packet cannot contain a frame that retires itself. In scenarios such as path migration, it is possible for there to be multiple active paths with different active connection IDs that could be used to retire each other. The exploit triggered an unintentional behaviour of a quiche design feature that supports retirement across paths while maintaining full connection ID synchronization, leading to an infinite loop.This issue affects quiche: from 0.15.0 before 0.24.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cloudflare:quiche:*:*:*:*:*:rust:*:*",
          "versionStartIncluding" : "0.15.0",
          "versionEndExcluding" : "0.24.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-07T16:15Z",
    "lastModifiedDate" : "2025-08-14T19:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44779",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://a1batr0ss.top/2025/03/17/Ollama-arbitrary-file-deletion-vulnerability/",
          "name" : "https://a1batr0ss.top/2025/03/17/Ollama-arbitrary-file-deletion-vulnerability/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://a1batr0ss.top/2025/08/06/CVE-2025-44779-Ollama-arbitrary-file-deletion/",
          "name" : "https://a1batr0ss.top/2025/08/06/CVE-2025-44779-Ollama-arbitrary-file-deletion/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/ollama/ollama",
          "name" : "https://github.com/ollama/ollama",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in Ollama v0.1.33 allows attackers to delete arbitrary files via sending a crafted packet to the endpoint /api/pull."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ollama:ollama:0.1.33:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T16:15Z",
    "lastModifiedDate" : "2025-08-14T20:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-56339",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7239955",
          "name" : "https://www.ibm.com/support/pages/node/7239955",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM WebSphere Application Server 9.0 and WebSphere Application Server Liberty 17.0.0.3 through 25.0.0.7 could allow a remote attacker to bypass security restrictions caused by a failure to honor security configuration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:9.0.0.0:*:*:*:-:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:websphere_application_server:*:*:*:*:liberty:*:*:*",
          "versionStartIncluding" : "17.0.0.3",
          "versionEndIncluding" : "25.0.0.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-07T16:15Z",
    "lastModifiedDate" : "2025-08-14T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50952",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/uclouvain/openjpeg/issues/1505",
          "name" : "https://github.com/uclouvain/openjpeg/issues/1505",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "openjpeg v 2.5.0 was discovered to contain a NULL pointer dereference via the component /openjp2/dwt.c."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:uclouvain:openjpeg:2.5.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T15:15Z",
    "lastModifiedDate" : "2025-08-14T20:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52680",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.eyoucms.com",
          "name" : "http://www.eyoucms.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://gist.github.com/cyb3res3c/c715407bfe6d418d8e6da61e1ab41fc8",
          "name" : "https://gist.github.com/cyb3res3c/c715407bfe6d418d8e6da61e1ab41fc8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EyouCMS 1.6.7 is vulnerable to Cross Site Scripting (XSS) in /login.php?m=admin&c=System&a=web&lang=cn."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eyoucms:eyoucms:1.6.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T14:15Z",
    "lastModifiedDate" : "2025-08-14T20:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54784",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "name" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-vg8q-xcq5-mh3p",
          "name" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-vg8q-xcq5-mh3p",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. There is a Cross Site Scripting (XSS) vulnerability in the email viewer in versions 7.14.0 through 7.14.6. An external attacker could send a prepared message to the inbox of the SuiteCRM-instance. By simply viewing emails as the logged-in user, the payload can be triggered. With that, an attacker is able to run arbitrary actions as the logged-in user - like extracting data, or if it is an admin executing the payload, takeover the instance. This is fixed in versions 7.14.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.14.0",
          "versionEndExcluding" : "7.14.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.6.0",
          "versionEndExcluding" : "8.8.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-07T01:15Z",
    "lastModifiedDate" : "2025-08-12T20:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54783",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "name" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-vqrj-gp9m-8c6r",
          "name" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-vqrj-gp9m-8c6r",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. Versions 7.14.6 and below have a Reflected Cross-Site Scripting (XSS) vulnerability. This vulnerability allows an attacker to execute JavaScript code by modifying the HTTP Referer header to include some arbitrary domain with malicious JavaScript code at the end. The server will attempt to block the arbitrary domain but allow the JavaScript code to execute. This is fixed in version 7.14.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.14.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-07T01:15Z",
    "lastModifiedDate" : "2025-08-12T20:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54788",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "name" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-v3m9-8wg7-c72x",
          "name" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-v3m9-8wg7-c72x",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions and below, the InboundEmail module allows the arbitrary execution of queries in the backend database, leading to SQL injection. This can have wide-reaching implications on confidentiality, integrity, and availability, as database data can be retrieved, modified, or removed entirely. This issue is fixed in version 7.14.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.14.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T00:15Z",
    "lastModifiedDate" : "2025-08-14T20:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54786",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/8.x/admin/releases/8.8",
          "name" : "https://docs.suitecrm.com/8.x/admin/releases/8.8",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM-Core/security/advisories/GHSA-rf2v-4mv3-qcgm",
          "name" : "https://github.com/SuiteCRM/SuiteCRM-Core/security/advisories/GHSA-rf2v-4mv3-qcgm",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 7.14.6 and 8.8.0, the broken authentication in the legacy iCal service allows unauthenticated access to meeting data. An unauthenticated actor can view any user's meeting (calendar event) data given their username, related functionality allows user enumeration. This is fixed in versions 7.14.7 and 8.8.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:7.14.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:8.8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T00:15Z",
    "lastModifiedDate" : "2025-08-14T20:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54785",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "name" : "https://docs.suitecrm.com/admin/releases/7.14.x/#_7_14_7",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-53cp-mpfw-qj67",
          "name" : "https://github.com/SuiteCRM/SuiteCRM/security/advisories/GHSA-53cp-mpfw-qj67",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SuiteCRM is an open-source, enterprise-ready Customer Relationship Management (CRM) software application. In versions 7.14.6  and 8.8.0, user-supplied input is not validated/sanitized before it is passed to the unserialize function, which could lead to penetration, privilege escalation, sensitive data exposure, Denial of Service, cryptomining and ransomware. This issue is fixed in version 7.14.7 and 8.8.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:7.14.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:salesagility:suitecrm:8.8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-07T00:15Z",
    "lastModifiedDate" : "2025-08-13T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6634",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted TGA file, when linked or imported into Autodesk 3ds Max, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T21:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6633",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RBG file, when parsed through Autodesk 3ds Max, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T21:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6632",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0016",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PSD file, when linked or imported into Autodesk 3ds Max, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T21:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45766",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/ZupeiNie/9de26f17a5e135b50fa388999e912c42",
          "name" : "https://gist.github.com/ZupeiNie/9de26f17a5e135b50fa388999e912c42",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/pocoproject",
          "name" : "https://github.com/pocoproject",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/pocoproject/poco",
          "name" : "https://github.com/pocoproject/poco",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "poco v1.14.1-release was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pocoproject:poco:1.14.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T20:15Z",
    "lastModifiedDate" : "2025-08-17T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38747",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-378"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000353093/dsa-2025-315",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000353093/dsa-2025-315",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contain a Creation of Temporary File With Insecure Permissions vulnerability. A local authenticated attacker could potentially exploit this vulnerability, leading to Elevation of Privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_os_recovery:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.14.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38746",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000353093/dsa-2025-315",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000353093/dsa-2025-315",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell SupportAssist OS Recovery, versions prior to 5.5.14.0, contains an Exposure of Sensitive Information to an Unauthorized Actor vulnerability. An unauthenticated attacker with physical access could potentially exploit this vulnerability, leading to Information Disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:supportassist_os_recovery:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.14.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8419",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-93"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-8419",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-8419",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2385776",
          "name" : "RHBZ#2385776",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Keycloak-services. Special characters used during e-mail registration may perform SMTP Injection and unexpectedly send short unwanted e-mails. The email is limited to 64 characters (limited local part of the email), so the attack is limited to very shorts emails (subject and little data, the example is 60 chars). This flaw's only direct consequence is an unsolicited email being sent from the Keycloak server. However, this action could be a precursor for more sophisticated attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T17:15Z",
    "lastModifiedDate" : "2025-08-13T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50234",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiaoyangsec/mccms/blob/main/MCCMS-SSRF.md",
          "name" : "https://github.com/xiaoyangsec/mccms/blob/main/MCCMS-SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MCCMS v2.7.0 has an SSRF vulnerability located in the index() method of the sys\\apps\\controllers\\api\\Gf.php file, where the pic parameter is processed. The pic parameter is decrypted using the sys_auth($pic, 1) function, which utilizes a hard-coded key Mc_Encryption_Key (bD2voYwPpNuJ7B8), defined in the db.php file. The decrypted URL is passed to the geturl() method, which uses cURL to make a request to the URL without proper security checks. An attacker can craft a malicious encrypted pic parameter, which, when decrypted, points to internal addresses or local file paths (such as http://127.0.0.1 or file://). By using the file:// protocol, the attacker can access arbitrary files on the local file system (e.g., file:///etc/passwd, file:///C:/Windows/System32/drivers/etc/hosts), allowing them to read sensitive configuration files, log files, and more, leading to information leakage or system exposure. The danger of this SSRF vulnerability includes accessing internal services and local file systems through protocols like http://, ftp://, and file://, which can result in sensitive data leakage, remote code execution, privilege escalation, or full system compromise, severely affecting the system's security and stability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:chshcms:mccms:2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T15:15Z",
    "lastModifiedDate" : "2025-08-18T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36020",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241547",
          "name" : "https://www.ibm.com/support/pages/node/7241547",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Guardium Data Protection could allow a remote attacker to obtain sensitive information due to cleartext transmission of sensitive credential information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:guardium_data_protection:11.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T15:15Z",
    "lastModifiedDate" : "2025-08-13T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3354",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241472",
          "name" : "https://www.ibm.com/support/pages/node/7241472",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T14:15Z",
    "lastModifiedDate" : "2025-08-13T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3320",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241472",
          "name" : "https://www.ibm.com/support/pages/node/7241472",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Tivoli Monitoring 6.3.0.7 through 6.3.0.7 Service Pack 20 is vulnerable to a heap-based buffer overflow, caused by improper bounds checking. A remote attacker could overflow a buffer and execute arbitrary code on the system or cause the server to crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:tivoli_monitoring:6.3.0.7:sp9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T14:15Z",
    "lastModifiedDate" : "2025-08-13T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23335",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-191"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23335",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23335",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23335",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23335",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux and the Tensor RT backend contain a vulnerability where an attacker could cause an underflow by a specific model configuration and a specific input. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23334",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23334",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23334",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23334",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23334",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by sending a request. A successful exploit of this vulnerability might lead to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23333",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23333",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23333",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23333",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23333",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds read by manipulating shared memory data. A successful exploit of this vulnerability might lead to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23331",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-789"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23331",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23331",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23331",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23331",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a memory allocation with excessive size value, leading to a segmentation fault, by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.06",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23327",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23327",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23327",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23327",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23327",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through specially crafted inputs. A successful exploit of this vulnerability might lead to denial of service and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23326",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-680"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23326",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23326",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23326",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23326",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause an integer overflow through a specially crafted input. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23325",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-674"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23325",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23325",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23325",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23325",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause uncontrolled recursion through a specially crafted input. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23324",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23324",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23324",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23324",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23324",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault,  by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23323",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23323",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23323",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23323",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23323",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause an integer overflow or wraparound, leading to a segmentation fault, by providing an invalid request. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.05",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23322",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-415"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23322",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23322",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23322",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23322",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where multiple requests could cause a double free when a stream is cancelled before it is processed. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.06",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23321",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-369"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23321",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23321",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23321",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23321",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where a user could cause a divide by zero issue by issuing an invalid request. A successful exploit of this vulnerability might lead to denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23320",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23320",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23320",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23320",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23320",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause the shared memory limit to be exceeded by sending a very large request. A successful exploit of this vulnerability might lead to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23319",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-805"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23319",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23319",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23319",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23319",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write by sending a request. A successful exploit of this vulnerability might lead to remote code execution, denial of service, data tampering, or information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23318",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-805"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23318",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23318",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23318",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23318",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability in the Python backend, where an attacker could cause an out-of-bounds write. A successful exploit of this vulnerability might lead to code execution, denial of service, data tampering, and information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23317",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23317",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23317",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23317",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23317",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server contains a vulnerability in the HTTP server, where an attacker could start a reverse shell by sending a specially crafted HTTP request. A successful exploit of this vulnerability might lead to remote code execution, denial of service, data tampering, or information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23311",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23311",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23311",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23311",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23311",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server contains a vulnerability where an attacker could cause a stack overflow through specially crafted HTTP requests. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, or data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23310",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23310",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-23310",
          "refsource" : "",
          "tags" : [ "US Government Resource" ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5687",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2025-23310",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2025-23310",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Triton Inference Server for Windows and Linux contains a vulnerability where an attacker could cause stack buffer overflow by specially crafted inputs. A successful exploit of this vulnerability might lead to remote code execution, denial of service, information disclosure, and data tampering."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:nvidia:triton_inference_server:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.07",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T13:15Z",
    "lastModifiedDate" : "2025-08-12T16:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8620",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/impress-org/givewp/issues/8042",
          "name" : "https://github.com/impress-org/givewp/issues/8042",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336253%40give&new=3336253%40give&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3336253%40give&new=3336253%40give&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.linkedin.com/posts/givewp_givewp-support-handpicked-from-the-best-activity-7356319738290974720-Dt4U/?utm_source=share&utm_medium=member_desktop&rcm=ACoAABmBk5UBxPIzCp0cgsD1_1xKASTMphetnI4",
          "name" : "https://www.linkedin.com/posts/givewp_givewp-support-handpicked-from-the-best-activity-7356319738290974720-Dt4U/?utm_source=share&utm_medium=member_desktop&rcm=ACoAABmBk5UBxPIzCp0cgsD1_1xKASTMphetnI4",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc7c5a6-513e-4aa8-9538-0ac6fb37c867?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6dc7c5a6-513e-4aa8-9538-0ac6fb37c867?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.6.0. This makes it possible for unauthenticated attackers to extract donor names, emails, and donor id."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.6.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T10:15Z",
    "lastModifiedDate" : "2025-08-12T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47324",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1230"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information disclosure while accessing and modifying the PIB file of a remote device via powerline."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca7005_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca7005:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27076",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing simultaneous requests via escape path."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8180x\\+sdx55_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8180x\\+sdx55:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_\\(sc7180-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform_\\(sc7180-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_\\(sc7180-ad\\)_\\\"rennell_pro\\\"_firmware:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform_\\(sc7180-ad\\)_\\\"rennell_pro\\\":*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8c_compute_platform_\\(sc8180x-ad\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8c_compute_platform_\\(sc8180x-ad\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8c_compute_platform_\\(sc8180xp-ad\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8c_compute_platform_\\(sc8180xp-ad\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-aa\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-aa\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180xp-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180xp-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180xp-af\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180xp-af\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-af\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-af\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180xp-aa\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180xp-aa\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180xp-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180xp-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27075",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-129"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing IOCTL command with larger buffer in Bluetooth Host."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:aqt1000_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:aqt1000:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6420_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6420:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm5430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm5430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcm6490_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcm6490:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs5430_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs5430:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs6490_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs6490:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c\\+_gen_3_compute_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c\\+_gen_3_compute:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8c_compute_platform_\\(sc8180x-ad\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8c_compute_platform_\\(sc8180x-ad\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-aa\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-aa\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_compute_platform_\\(sc8180x-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-af\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_2_5g_compute_platform_\\(sc8180x-af\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27072",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information disclosure while processing a packet at EAVB BE side with invalid header length."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8620p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8620p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qamsrv1h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qamsrv1h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qamsrv1m_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qamsrv1m:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6574a_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6574a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6595_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6595:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6595au_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6595au:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6688aq_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6688aq:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8770p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8770p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:srv1h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:srv1h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:srv1l_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:srv1l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:srv1m_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:srv1m:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27071",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing specific files in Powerline Communication Firmware."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qsm8250_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qsm8250:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sdm429w_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sdm429w:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sdx55_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sdx55:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_429_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_429_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3620_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3620:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27069",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-822"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing DDI command calls."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27068",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-126"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing an IOCTL command with an arbitrary address."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6250_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6250:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c_compute_platform_\\(sc7180-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c_compute_platform_\\(sc7180-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_7c_gen_2_compute_platform_\\(sc7180-ad\\)_\\\"rennell_pro\\\"_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_7c_gen_2_compute_platform_\\(sc7180-ad\\)_\\\"rennell_pro\\\":-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8cx_gen_3_compute_platform_\\(sc8280xp-bb\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27067",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-129"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing DDI call with invalid buffer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21474",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption while processing commands from A2dp sink command queue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8295p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8295p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6426_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6426:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6436_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6436:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6574au_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6574au:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6696_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6696:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcn9074_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcn9074:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs410_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs410:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs610_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs610:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:video_collaboration_vc1_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:video_collaboration_vc1_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:video_collaboration_vc3_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:video_collaboration_vc3_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6145p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6145p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6150p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6150p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa6155p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa6155p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8145p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8145p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8150p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8150p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8155p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8155p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8195p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8195p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8295p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8295p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sd865_5g_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sd865_5g:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_865_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_865_5g_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_865\\+_5g_mobile_platform_\\(sm8250-ab\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_870_5g_mobile_platform_\\(sm8250-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_w5\\+_gen_1_wearable_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_x55_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_x55_5g_modem-rf_system:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_xr2_5g_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_xr2_5g_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sxr2130_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sxr2130:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9341_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9341:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3660b_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3660b:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3680b_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3680b:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3950_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3950:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21473",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption when using Virtual cdm (Camera Data Mover) to write registers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21472",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-489"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information disclosure while capturing logs as eSE debug messages are logged."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca9367_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca9367:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca9377_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca9377:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8530p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8530p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8540p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8540p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21461",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption when programming registers through virtual CDM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm6650_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm6650:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7635_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7635:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_1_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21458",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory corruption when IOCTL interface is called to map and unmap buffers simultaneously."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8650p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8650p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qam8775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qam8775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6174a_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6174a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa7255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa7255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa7775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa7775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8255p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8255p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8620p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8620p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8650p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8650p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa8775p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa8775p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sa9000p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sa9000p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_888_5g_mobile_platform_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_888_5g_mobile_platform:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_888\\+_5g_mobile_platform_\\(sm8350-ac\\)_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_888\\+_5g_mobile_platform_\\(sm8350-ac\\):-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:sw5100p_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:sw5100p:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3980_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3980:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21457",
        "ASSIGNER" : "security.cna@qualcomm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-126"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "name" : "https://docs.qualcomm.com/product/publicresources/securitybulletin/august-2025-bulletin.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information disclosure while opening a fastrpc session when domain is not sanitized."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6584au_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6584au:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca6698aq_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca6698aq:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_auto_5g_modem-rf_gen_2_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_auto_5g_modem-rf_gen_2:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-08-06T08:15Z",
    "lastModifiedDate" : "2025-08-19T13:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21021",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in drawing pinpad in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:blockchain_keystore:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.17.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-15T15:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21020",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in creating bitmap images in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:blockchain_keystore:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.17.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-15T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21019",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authorization in Samsung Health prior to version 6.30.1.003 allows local attackers to access data in Samsung Health. User interaction is required for triggering this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:health:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.30.1.003",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-15T16:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21018",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to read out-of-bounds memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:blockchain_keystore:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.17.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-15T16:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21017",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/serviceWeb.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in detaching crypto box in Blockchain Keystore prior to version 1.3.17.2 allows local privileged attackers to write out-of-bounds memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:blockchain_keystore:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.3.17.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-15T16:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-21010",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper privilege management in SamsungAccount prior to SMR Aug-2025 Release 1 allows local privileged attackers to deactivate Samsung account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:16.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-12T16:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20990",
        "ASSIGNER" : "mobile.security@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=08",
          "name" : "https://security.samsungmobile.com/securityUpdate.smsb?year=2025&month=08",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in accessing system device node prior to SMR Aug-2025 Release 1 allows local attackers to access device identifier."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2023-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-aug-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-dec-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-feb-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jan-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-nov-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-oct-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-sep-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-aug-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-dec-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-feb-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jan-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2021-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-nov-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-oct-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2022-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-sep-2024-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-apr-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-mar-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-jun-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-may-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:13.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:14.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:samsung:android:15.0:smr-jul-2025-r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T05:15Z",
    "lastModifiedDate" : "2025-08-12T16:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8100",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-open-street-map.js#L57",
          "name" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-open-street-map.js#L57",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/open-street-map/widgets/open-street-map.php#L498",
          "name" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/modules/open-street-map/widgets/open-street-map.php#L498",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3339093%40bdthemes-element-pack-lite&new=3339093%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3339093%40bdthemes-element-pack-lite&new=3339093%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f5d3585-19fe-4e85-87d0-7f4c62944146?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3f5d3585-19fe-4e85-87d0-7f4c62944146?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Element Pack Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'marker_content' parameter in versions up to, and including, 8.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
          "versionEndExcluding" : "8.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7498",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/trunk/assets/js/exad-scripts.js#L187",
          "name" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/trunk/assets/js/exad-scripts.js#L187",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/trunk/assets/vendor/js/jquery.countdown.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/trunk/assets/vendor/js/jquery.countdown.min.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3326867%40exclusive-addons-for-elementor&new=3326867%40exclusive-addons-for-elementor&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3326867%40exclusive-addons-for-elementor&new=3326867%40exclusive-addons-for-elementor&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/51d3d738-5c82-4f6b-b8f3-d5af5391b6f6?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/51d3d738-5c82-4f6b-b8f3-d5af5391b6f6?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown Widget in all versions up to, and including, 2.7.9.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.7.9.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-12T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54651",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race condition vulnerability in the kernel hufs module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54649",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of using incompatible types to access resources in the location service.\nImpact: Successful exploitation of this vulnerability may cause some location information attributes to be incorrect."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54648",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54647",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read vulnerability in the SSAP module of the NearLink protocol stack.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54646",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of inadequate packet length check in the BLE module.\nImpact: Successful exploitation of this vulnerability may affect performance."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54645",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds array access issue due to insufficient data verification in the location service module.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T04:16Z",
    "lastModifiedDate" : "2025-08-13T18:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54616",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds array access vulnerability in the ArkUI framework.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54615",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of insufficient information protection in the media library module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54614",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Input verification vulnerability in the home screen module.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54611",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EXTRA_REFERRER resource read vulnerability in the Gallery module.\nImpact: Successful exploitation of this vulnerability may affect service confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:15.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54610",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds access vulnerability in the audio codec module.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54609",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds access vulnerability in the audio codec module.\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T02:15Z",
    "lastModifiedDate" : "2025-08-12T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54653",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/cn/support/bulletinlaptops/2025/8/",
          "name" : "https://consumer.huawei.com/cn/support/bulletinlaptops/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Path traversal vulnerability in the virtualization file module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization file module."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.0,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-06T01:15Z",
    "lastModifiedDate" : "2025-08-18T15:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54652",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/cn/support/bulletinlaptops/2025/8/",
          "name" : "https://consumer.huawei.com/cn/support/bulletinlaptops/2025/8/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Path traversal vulnerability in the virtualization base module. Successful exploitation of this vulnerability may affect the confidentiality of the virtualization module."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-06T01:15Z",
    "lastModifiedDate" : "2025-08-18T15:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52237",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://sscms.com",
          "name" : "http://sscms.com",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/CTRLCCT/c9b5aab78a179a2d92a41889a588c933",
          "name" : "https://gist.github.com/CTRLCCT/c9b5aab78a179a2d92a41889a588c933",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in the component /stl/actions/download?filePath of SSCMS v7.3.1 allows attackers to execute a directory traversal."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sscms:sscms:7.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T21:15Z",
    "lastModifiedDate" : "2025-08-15T16:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50592",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://seacms.com",
          "name" : "http://seacms.com",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1515601525/CVE-2025-50592/issues/1",
          "name" : "https://github.com/1515601525/CVE-2025-50592/issues/1",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://seacms.net/",
          "name" : "https://seacms.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross site scripting vulnerability in seacms before 13.2 via the vid parameter to Upload/js/player/dmplayer/player."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:seacms:seacms:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "13.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T20:15Z",
    "lastModifiedDate" : "2025-08-15T16:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54254",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html",
          "name" : "https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Experience Manager versions 6.5.23 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could lead to arbitrary file system read. An attacker could exploit this vulnerability to access sensitive files on the local file system. Exploitation of this issue does not require user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:experience_manager_forms:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "6.5.23.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-05T17:15Z",
    "lastModifiedDate" : "2025-08-13T18:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54253",
        "ASSIGNER" : "psirt@adobe.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html",
          "name" : "https://helpx.adobe.com/security/products/aem-forms/apsb25-82.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://slcyber.io/assetnote-security-research-center/struts-devmode-in-2025-critical-pre-auth-vulnerabilities-in-adobe-experience-manager-forms/",
          "name" : "https://slcyber.io/assetnote-security-research-center/struts-devmode-in-2025-critical-pre-auth-vulnerabilities-in-adobe-experience-manager-forms/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Adobe Experience Manager versions 6.5.23 and earlier are affected by a Misconfiguration vulnerability that could result in arbitrary code execution. An attacker could leverage this vulnerability to bypass security mechanisms and execute code. Exploitation of this issue does not require user interaction and scope is changed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:adobe:experience_manager_forms:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "6.5.23.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T17:15Z",
    "lastModifiedDate" : "2025-08-13T18:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50707",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://xinyisleep.github.io/2024-07-15/Thinkphp3.%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-39045",
          "name" : "https://xinyisleep.github.io/2024-07-15/Thinkphp3.%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-39045",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://xinyisleep.github.io/2024-07-15/Thinkphp3.%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-39045",
          "name" : "https://xinyisleep.github.io/2024-07-15/Thinkphp3.%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-39045",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://xinyisleep.github.io/CVE-2025-50707.md",
          "name" : "https://xinyisleep.github.io/CVE-2025-50707.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in thinkphp3 v.3.2.5 allows a remote attacker to execute arbitrary code via the index.php component"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:thinkphp:thinkphp:3.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T15:15Z",
    "lastModifiedDate" : "2025-08-14T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50706",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981",
          "name" : "https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981",
          "name" : "https://xinyisleep.github.io/2024-04-24/Thinkphp5.1%E6%96%87%E4%BB%B6%E5%8C%85%E5%90%AB-CNVD-2024-29981",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://xinyisleep.github.io/CVE-2025-50706.md",
          "name" : "https://xinyisleep.github.io/CVE-2025-50706.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in thinkphp v.5.1 allows a remote attacker to execute arbitrary code via the routecheck function"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:thinkphp:thinkphp:5.1.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T15:15Z",
    "lastModifiedDate" : "2025-08-14T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44964",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://bluestacks.com",
          "name" : "http://bluestacks.com",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://claroty.com/team82/disclosure-dashboard/cve-2025-44964",
          "name" : "https://claroty.com/team82/disclosure-dashboard/cve-2025-44964",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A lack of SSL certificate validation in BlueStacks v5.20 allows attackers to execute a man-it-the-middle attack and obtain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bluestacks:bluestacks:5.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T15:15Z",
    "lastModifiedDate" : "2025-08-14T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52890",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-84"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241392",
          "name" : "https://www.ibm.com/support/pages/node/7241392",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Engineering Lifecycle Optimization - Publishing 7.0.2 and 7.03 could be susceptible to cross-site scripting due to no validation of URIs."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:engineering_lifecycle_optimization:7.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:engineering_lifecycle_optimization:7.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T14:15Z",
    "lastModifiedDate" : "2025-08-14T01:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54987",
        "ASSIGNER" : "security@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://success.trendmicro.com/en-US/solution/KA-0020652",
          "name" : "https://success.trendmicro.com/en-US/solution/KA-0020652",
          "refsource" : "",
          "tags" : [ "Patch", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations. This vulnerability is essentially the same as CVE-2025-54948 but targets a different CPU architecture."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:on-premises:windows:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-05T13:15Z",
    "lastModifiedDate" : "2025-08-12T14:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54948",
        "ASSIGNER" : "security@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://success.trendmicro.com/en-US/solution/KA-0020652",
          "name" : "https://success.trendmicro.com/en-US/solution/KA-0020652",
          "refsource" : "",
          "tags" : [ "Patch", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Trend Micro Apex One (on-premise) management console could allow a pre-authenticated remote attacker to upload malicious code and execute commands on affected installations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:trendmicro:apex_one:2019:*:*:*:on-premises:windows:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-05T13:15Z",
    "lastModifiedDate" : "2025-08-19T01:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6207",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/class-wpie-common-action.php#L386",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/class-wpie-common-action.php#L386",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3323402/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3323402/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/188eef67-de66-49c2-aa6c-2cf3b886ff66?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/188eef67-de66-49c2-aa6c-2cf3b886ff66?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_tempalte_import' function in all versions up to, and including, 3.9.28. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vjinfotech:wp_import_export_lite:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.9.29",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-05T08:15Z",
    "lastModifiedDate" : "2025-08-12T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5061",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/import/class-wpie-upload-validate.php#L24",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/import/class-wpie-upload-validate.php#L24",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/import/class-wpie-upload-validate.php#L89",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-import-export-lite/trunk/includes/classes/import/class-wpie-upload-validate.php#L89",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3323402/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3323402/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3338701/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3338701/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c0f3248-fef6-48a5-b2e1-f2778528fba1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5c0f3248-fef6-48a5-b2e1-f2778528fba1?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Import Export Lite plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'wpie_parse_upload_data' function in all versions up to, and including, 3.9.29. This makes it possible for authenticated attackers, with Subscriber-level access and above, and permissions granted by an Administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. The vulnerability was partially patched in version 3.9.29."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vjinfotech:wp_import_export_lite:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.9.30",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-05T08:15Z",
    "lastModifiedDate" : "2025-08-13T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8545",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8545/",
          "name" : "https://karinagante.github.io/cve-2025-8545/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318674",
          "name" : "VDB-318674 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318674",
          "name" : "VDB-318674 | Portabilis i-Educar educar_motivo_afastamento_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620481",
          "name" : "Submit #620481 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.10. Affected by this issue is some unknown functionality of the file /intranet/educar_motivo_afastamento_cad.php. The manipulation of the argument nm_motivo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T05:15Z",
    "lastModifiedDate" : "2025-08-12T17:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8544",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8544/",
          "name" : "https://karinagante.github.io/cve-2025-8544/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318673",
          "name" : "VDB-318673 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318673",
          "name" : "VDB-318673 | Portabilis i-Educar edit cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620480",
          "name" : "Submit #620480 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Portabilis i-Educar 2.10. Affected by this vulnerability is an unknown functionality of the file /module/RegraAvaliacao/edit. The manipulation of the argument nome leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T05:15Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8543",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8543/",
          "name" : "https://karinagante.github.io/cve-2025-8543/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318672",
          "name" : "VDB-318672 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318672",
          "name" : "VDB-318672 | Portabilis i-Educar educar_raca_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620476",
          "name" : "Submit #620476 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. Affected is an unknown function of the file /intranet/educar_raca_cad.php. The manipulation of the argument nm_raca leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T04:16Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8542",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8542/",
          "name" : "https://karinagante.github.io/cve-2025-8542/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318671",
          "name" : "VDB-318671 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318671",
          "name" : "VDB-318671 | Portabilis i-Educar empresas_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620466",
          "name" : "Submit #620466 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.10. It has been rated as problematic. This issue affects some unknown processing of the file /intranet/empresas_cad.php. The manipulation of the argument fantasia/razao_social leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T04:16Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8541",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8541/",
          "name" : "https://karinagante.github.io/cve-2025-8541/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318670",
          "name" : "VDB-318670 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318670",
          "name" : "VDB-318670 | Portabilis i-Educar public_uf_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620458",
          "name" : "Submit #620458 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.10. It has been declared as problematic. This vulnerability affects unknown code of the file /intranet/public_uf_cad.php. The manipulation of the argument nome leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T03:15Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8540",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8540.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8540.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://karinagante.github.io/cve-2025-8540/",
          "name" : "https://karinagante.github.io/cve-2025-8540/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318669",
          "name" : "VDB-318669 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318669",
          "name" : "VDB-318669 | Portabilis i-Educar public_municipio_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620456",
          "name" : "https://vuldb.com/?submit.620456",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620456",
          "name" : "Submit #620456 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.10. It has been classified as problematic. This affects an unknown part of the file /intranet/public_municipio_cad.php. The manipulation of the argument nome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T03:15Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8539",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8539.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8539.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://karinagante.github.io/cve-2025-8539/",
          "name" : "https://karinagante.github.io/cve-2025-8539/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318668",
          "name" : "VDB-318668 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318668",
          "name" : "VDB-318668 | Portabilis i-Educar public_distrito_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620453",
          "name" : "https://vuldb.com/?submit.620453",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620453",
          "name" : "Submit #620453 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.10 and classified as problematic. Affected by this issue is some unknown functionality of the file /intranet/public_distrito_cad.php. The manipulation of the argument nome leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T02:15Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8538",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://karinagante.github.io/cve-2025-8538/",
          "name" : "https://karinagante.github.io/cve-2025-8538/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318667",
          "name" : "VDB-318667 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318667",
          "name" : "VDB-318667 | Portabilis i-Educar novo cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.620451",
          "name" : "Submit #620451 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8538.md",
          "name" : "https://github.com/KarinaGante/KGSec/blob/main/CVEs/i-educar/CVE-2025-8538.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://karinagante.github.io/cve-2025-8538/",
          "name" : "https://karinagante.github.io/cve-2025-8538/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.620451",
          "name" : "https://vuldb.com/?submit.620451",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Portabilis i-Educar 2.10 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /usuarios/tipos/novo. The manipulation of the argument name/description leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-05T01:15Z",
    "lastModifiedDate" : "2025-08-12T17:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54804",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Eugeny/russh/commit/0eb5e406780890e21ff71dd25d731b30676478e5",
          "name" : "https://github.com/Eugeny/russh/commit/0eb5e406780890e21ff71dd25d731b30676478e5",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/Eugeny/russh/security/advisories/GHSA-h5rc-j5f5-3gcm",
          "name" : "https://github.com/Eugeny/russh/security/advisories/GHSA-h5rc-j5f5-3gcm",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Eugeny/russh/security/advisories/GHSA-h5rc-j5f5-3gcm",
          "name" : "https://github.com/Eugeny/russh/security/advisories/GHSA-h5rc-j5f5-3gcm",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Russh is a Rust SSH client & server library. In versions 0.54.0 and below, the channel window adjust message of the SSH protocol is used to track the free space in the receive buffer of the other side of a channel. The current implementation takes the value from the message and adds it to an internal state value. This can result in a integer overflow. If the Rust code is compiled with overflow checks, it will panic. A malicious client can crash a server. This is fixed in version 0.54.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:russh_project:russh:*:*:*:*:*:rust:*:*",
          "versionEndExcluding" : "0.54.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:warpgate_project:warpgate:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.16.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-05T01:15Z",
    "lastModifiedDate" : "2025-08-13T18:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-55014",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110370",
          "name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110370",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.debian.org/debian-user/2025/08/msg00076.html",
          "name" : "https://lists.debian.org/debian-user/2025/08/msg00076.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://packages.debian.org/trixie/stardict",
          "name" : "https://packages.debian.org/trixie/stardict",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://packages.debian.org/trixie/stardict-gtk",
          "name" : "https://packages.debian.org/trixie/stardict-gtk",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://stardict-4.sourceforge.net/index_en.php",
          "name" : "https://stardict-4.sourceforge.net/index_en.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/08/04/1",
          "name" : "https://www.openwall.com/lists/oss-security/2025/08/04/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lwn.net/SubscriberLink/1032732/3334850da49689e1/",
          "name" : "https://lwn.net/SubscriberLink/1032732/3334850da49689e1/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://news.ycombinator.com/item?id=44872313",
          "name" : "https://news.ycombinator.com/item?id=44872313",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The YouDao plugin for StarDict, as used in stardict 3.0.7+git20220909+dfsg-6 in Debian trixie and elsewhere, sends an X11 selection to the dict.youdao.com and dict.cn servers via cleartext HTTP."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T20:15Z",
    "lastModifiedDate" : "2025-08-13T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-50340",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110604",
          "name" : "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1110604",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/millad7/SOGo_web_mail-vulnerability-CVE-2025-50340",
          "name" : "https://github.com/millad7/SOGo_web_mail-vulnerability-CVE-2025-50340",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mail-archive.com/users%40sogo.nu/msg34098.html",
          "name" : "https://www.mail-archive.com/users%40sogo.nu/msg34098.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sogo.nu/",
          "name" : "https://www.sogo.nu/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Insecure Direct Object Reference (IDOR) vulnerability was discovered in SOGo Webmail thru 5.6.0, allowing an authenticated user to send emails on behalf of other users by manipulating a user-controlled identifier in the email-sending request. The server fails to verify whether the authenticated user is authorized to use the specified sender identity, resulting in unauthorized message delivery as another user. This can lead to impersonation, phishing, or unauthorized communication within the system. NOTE: this is disputed by the Supplier because the only effective way to prevent this sender spoofing is on the SMTP server, not within a client such as SOGo."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T20:15Z",
    "lastModifiedDate" : "2025-08-15T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52239",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://shenzhen.com",
          "name" : "http://shenzhen.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "http://zkeacms.com",
          "name" : "http://zkeacms.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/CTRLCCT/BoolSpideer/blob/main/cve2.md",
          "name" : "https://github.com/CTRLCCT/BoolSpideer/blob/main/cve2.md",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/CTRLCCT/BoolSpideer/blob/main/cve2.md",
          "name" : "https://github.com/CTRLCCT/BoolSpideer/blob/main/cve2.md",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An arbitrary file upload vulnerability in ZKEACMS v4.1 allows attackers to execute arbitrary code via a crafted file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zkea:zkeacms:4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T19:15Z",
    "lastModifiedDate" : "2025-08-14T16:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51390",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://totolink.com",
          "name" : "http://totolink.com",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Luanruy/qianxin/blob/main/CVE-2025-51390.md",
          "name" : "https://github.com/Luanruy/qianxin/blob/main/CVE-2025-51390.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Luanruy/qianxin/blob/main/CVE-2025-51390.md",
          "name" : "https://github.com/Luanruy/qianxin/blob/main/CVE-2025-51390.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Luanruy/qianxin/blob/main/overflow-0x41ca08.md",
          "name" : "https://github.com/Luanruy/qianxin/blob/main/overflow-0x41ca08.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "TOTOLINK N600R V4.3.0cu.7647_B20210106 was discovered to contain a command injection vulnerability via the pin parameter in the setWiFiWpsConfig function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:n600r_firmware:4.3.0cu.7647_b20210106:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:n600r:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8517",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/givanz/Vvveb/commit/d4b1e030066417b77d15b4ac505eed5ae7bf2c5e",
          "name" : "https://github.com/givanz/Vvveb/commit/d4b1e030066417b77d15b4ac505eed5ae7bf2c5e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/issues/312",
          "name" : "https://github.com/givanz/Vvveb/issues/312",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/issues/312#issuecomment-2977995664",
          "name" : "https://github.com/givanz/Vvveb/issues/312#issuecomment-2977995664",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/releases/tag/1.0.7",
          "name" : "https://github.com/givanz/Vvveb/releases/tag/1.0.7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kwerty138/Session-Fixation-in-Vvveb-CMS-v1.0.6.1",
          "name" : "https://github.com/kwerty138/Session-Fixation-in-Vvveb-CMS-v1.0.6.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318643",
          "name" : "VDB-318643 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.318643",
          "name" : "VDB-318643 | givanz Vvveb session fixiation",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.623135",
          "name" : "Submit #623135 | Vvveb Vvveb CMS 1.0.6.1 Session Fixiation",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1",
          "name" : "https://github.com/helloandrewpaul/Session-Fixation-in-Vvveb-CMS-v1.0.6.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/givanz/Vvveb/issues/312",
          "name" : "https://github.com/givanz/Vvveb/issues/312",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in givanz Vvveb 1.0.6.1. Impacted is an unknown function. The manipulation results in session fixiation. The attack can be launched remotely. The exploit is now public and may be used. Upgrading to version 1.0.7 is recommended to address this issue. The patch is identified as d4b1e030066417b77d15b4ac505eed5ae7bf2c5e. You should upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T16:15Z",
    "lastModifiedDate" : "2025-08-18T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38739",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000349489/dsa-2025-302",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000349489/dsa-2025-302",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Digital Delivery, versions prior to 5.6.1.0, contains an Insufficiently Protected Credentials vulnerability. A remote unauthenticated attacker could potentially exploit this vulnerability, leading to Information Disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:digital_delivery:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.6.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-04T16:15Z",
    "lastModifiedDate" : "2025-08-18T15:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36607",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nas utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T14:15Z",
    "lastModifiedDate" : "2025-08-15T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36606",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Unity, version(s) 5.5 and prior, contain(s) an OS Command Injection Vulnerability in its svc_nfssupport utility. An authenticated attacker could potentially exploit this vulnerability, escaping the restricted shell and execute arbitrary operating system commands with root privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T14:15Z",
    "lastModifiedDate" : "2025-08-15T16:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36605",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in the CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting'). An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to the execution of malicious HTML or JavaScript code in a victim user's web browser in the context of the vulnerable web application. Exploitation may lead to information disclosure, session theft, or client-side request forgery."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T14:15Z",
    "lastModifiedDate" : "2025-08-15T16:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36604",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "name" : "https://www.dell.com/support/kbdoc/en-si/000350756/dsa-2025-281-security-update-for-dell-unity-dell-unityvsa-and-dell-unity-xt-security-update-for-multiple-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Unity, version(s) 5.5 and prior, contain(s) an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to arbitrary command execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:unity_operating_environment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.5.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-04T14:15Z",
    "lastModifiedDate" : "2025-08-15T16:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20698",
        "ASSIGNER" : "security@mediatek.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "name" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915400; Issue ID: MSV-3793."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T02:15Z",
    "lastModifiedDate" : "2025-08-18T15:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20697",
        "ASSIGNER" : "security@mediatek.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "name" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Power HAL, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege if a malicious actor has already obtained the System privilege. User interaction is not needed for exploitation. Patch ID: ALPS09915681; Issue ID: MSV-3795."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt2718:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8186:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8391:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8678:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8775:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8786:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8788e:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8792:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8796:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8873:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8883:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8893:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T02:15Z",
    "lastModifiedDate" : "2025-08-18T15:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20696",
        "ASSIGNER" : "security@mediatek.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "name" : "https://corp.mediatek.com/product-security-bulletin/August-2025",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In DA, there is a possible out of bounds write due to a missing bounds check. This could lead to local escalation of privilege, if an attacker has physical access to the device, with no additional execution privileges needed. User interaction is needed for exploitation. Patch ID: ALPS09915215; Issue ID: MSV-3801."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:linuxfoundation:yocto:4.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:rdkcentral:rdk-b:2024q1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:13.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:14.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:android:15.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:openwrt:openwrt:21.02.0:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:openwrt:openwrt:23.05:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:zephyrproject:zephyr:3.7.0:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6739:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6761:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6765:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6768:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6781:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6789:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6813:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6833:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6835:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6853:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6855:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6877:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6878:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6879:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6883:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6885:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6886:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6889:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6893:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6895:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6897:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6899:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6983:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6985:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6989:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6990:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt6991:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8188:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8196:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8370:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8390:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:mediatek:mt8676:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T02:15Z",
    "lastModifiedDate" : "2025-08-18T15:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8510",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/Reflected%20Cross-Site%20Scripting%20(XSS)%20in%20educar_matricula_lst.php%20via%20ref_cod_aluno%20Parameter.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46",
          "name" : "https://github.com/portabilis/i-educar/commit/82c288b9a4abb084bdfa1c0c4ef777ed45f98b46",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xg",
          "name" : "https://github.com/portabilis/i-educar/compare/GHSA-88xc-64vw-g4xg",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318609",
          "name" : "VDB-318609 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318609",
          "name" : "VDB-318609 | Portabilis i-Educar educar_matricula_lst.php Gerar cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.618964",
          "name" : "Submit #618964 | Portabilis i-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Portabilis i-Educar 2.10. This affects the function Gerar of the file ieducar/intranet/educar_matricula_lst.php. The manipulation of the argument ref_cod_aluno leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 82c288b9a4abb084bdfa1c0c4ef777ed45f98b46. It is recommended to apply a patch to fix this issue. The vendor initially closed the original advisory without requesting a CVE."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-03T13:15Z",
    "lastModifiedDate" : "2025-08-12T17:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8509",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8509.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8509.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_servidor_cad.php%20parameter%20matricula.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_servidor_cad.php%20parameter%20matricula.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318608",
          "name" : "VDB-318608 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318608",
          "name" : "VDB-318608 | Portabilis i-Educar educar_servidor_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.618679",
          "name" : "Submit #618679 | Portabilis i-Educar 2.9 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /intranet/educar_servidor_cad.php. The manipulation of the argument matricula leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-03T13:15Z",
    "lastModifiedDate" : "2025-08-12T17:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8508",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8508.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8508.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_avaliacao_desempenho_cad.php%20parameters%20titulo_avaliacao%20and%20descricao.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Stored%20XSS%20educar_avaliacao_desempenho_cad.php%20parameters%20titulo_avaliacao%20and%20descricao.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318607",
          "name" : "VDB-318607 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318607",
          "name" : "VDB-318607 | Portabilis i-Educar educar_avaliacao_desempenho_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.618678",
          "name" : "Submit #618678 | Portabilis i-Educar 2.9 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_avaliacao_desempenho_cad.php. The manipulation of the argument titulo_avaliacao/descricao leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-03T11:15Z",
    "lastModifiedDate" : "2025-08-12T17:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8507",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8507.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/CVE-2025-8507.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_funcao_lst.md",
          "name" : "https://github.com/marcelomulder/CVE/blob/main/i-educar/Reflected%20XXS%20educar_funcao_lst.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318606",
          "name" : "VDB-318606 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318606",
          "name" : "VDB-318606 | Portabilis i-Educar educar_funcao_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.618677",
          "name" : "Submit #618677 | Portabilis i-Educar 2.9 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9. It has been classified as problematic. Affected is an unknown function of the file /intranet/educar_funcao_lst.php. The manipulation of the argument nm_funcao/abreviatura leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-03T10:15Z",
    "lastModifiedDate" : "2025-08-12T17:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7694",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hub.woffice.io/woffice/changelog",
          "name" : "https://hub.woffice.io/woffice/changelog",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://themeforest.net/item/woffice-intranetextranet-wordpress-theme/11671924",
          "name" : "https://themeforest.net/item/woffice-intranetextranet-wordpress-theme/11671924",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/41a362cf-e27e-436a-85f1-7c48e2e098eb?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/41a362cf-e27e-436a-85f1-7c48e2e098eb?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Woffice Core plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the woffice_file_manager_delete() function in all versions up to, and including, 5.4.26. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xtendify:woffice:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.4.27",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-02T04:15Z",
    "lastModifiedDate" : "2025-08-12T17:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8480",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-766/",
          "name" : "ZDI-25-766",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 Command Injection Remote Code Execution. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Tidal music streaming application. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26357."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8477",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-767/",
          "name" : "ZDI-25-767",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26324."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8476",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-765/",
          "name" : "ZDI-25-765",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 TIDAL Improper Certificate Validation Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the TIDAL music streaming application. The issue results from improper certificate validation. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of root. Was ZDI-CAN-26322."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8475",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-764/",
          "name" : "ZDI-25-764",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 AVRCP Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the implementation of the AVRCP protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26321."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8474",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-763/",
          "name" : "ZDI-25-763",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 CarPlay Stack-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the Apple CarPlay protocol. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26318."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8473",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-762/",
          "name" : "ZDI-25-762",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 UPDM_wstpCBCUpdStart Command Injection Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the UPDM_wstpCBCUpdStart function. The issue results from the lack of proper validation of user-supplied data before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-26317."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8472",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-761/",
          "name" : "ZDI-25-761",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Alpine iLX-507 vCard Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Alpine iLX-507 devices. User interaction is required to exploit this vulnerability in that the target must connect to a malicious Bluetooth device.\n\nThe specific flaw exists within the parsing of vCard data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a stack-based buffer. An attacker can leverage this vulnerability to execute arbitrary code in the context of root. Was ZDI-CAN-26316."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:alpsalpine:ilx-507_firmware:6.0.000:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:alpsalpine:ilx-507:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6037",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-18-vault-certificate-auth-method-did-not-validate-common-name-for-non-ca-certificates/76037",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vault and Vault Enterprise (“Vault”) TLS certificate auth method did not correctly validate client certificates when configured with a non-CA certificate as [+trusted certificate+|https://developer.hashicorp.com/vault/api-docs/auth/cert#certificate]. In this configuration, an attacker may be able to craft a malicious certificate that could be used to impersonate another user. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6015",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-19-vault-login-mfa-bypass-of-rate-limiting-and-totp-token-reuse/76038",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vault and Vault Enterprise’s (“Vault”) login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "1.10.0",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.10.0",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6014",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-17-vault-totp-secrets-engine-code-reuse/76036",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vault and Vault Enterprise’s (“Vault”) TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6011",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-15-timing-side-channel-in-vault-s-userpass-auth-method/76034",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A timing side channel in Vault and Vault Enterprise’s (“Vault”) userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault’s Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6004",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-16-vault-userpass-and-ldap-user-lockout-bypass/76035",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vault and Vault Enterprise’s (“Vault”) user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "1.13.0",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.13.0",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6000",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-14-privileged-vault-operator-may-execute-code-on-the-underlying-host/76033",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault’s configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:1.20.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "0.8.0",
          "versionEndExcluding" : "1.20.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "0.8.0",
          "versionEndExcluding" : "1.16.23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5999",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-13-vault-root-namespace-operator-may-elevate-token-privileges/76032",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-13-vault-root-namespace-operator-may-elevate-token-privileges/76032",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A privileged Vault operator with write permissions to the root namespace’s identity endpoint could escalate their own or another user’s token privileges to Vault’s root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.18.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "0.10.4",
          "versionEndExcluding" : "1.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "0.10.4",
          "versionEndExcluding" : "1.16.22",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-13T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33118",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241303",
          "name" : "https://www.ibm.com/support/pages/node/7241303",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar SIEM 7.5 through 7.5.0 Update Pack 12 is vulnerable to stored cross-site scripting. This vulnerability allows authenticated users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_security_information_and_event_manager:7.5.0:update_pack_8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-14T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2824",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7241286",
          "name" : "https://www.ibm.com/support/pages/node/7241286",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, 9.0.0.1, and 9.5.0 could allow a remote attacker to conduct phishing attacks, using an open redirect attack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to spoof the URL displayed to redirect a user to a malicious Web site that would appear to be trusted. This could allow the attacker to obtain highly sensitive information or conduct further attacks against the victim."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.11.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.12.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.11.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:9.0.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:9.5.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-01T18:15Z",
    "lastModifiedDate" : "2025-08-14T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51504",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/progprnv/CVE-Reports",
          "name" : "https://github.com/progprnv/CVE-Reports",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51504",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51504",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BLive%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BLive%20Panel%5D%20Stored%20XSS%20in%20profile%20path.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Microweber CMS 2.0 is vulnerable to Cross Site Scripting (XSS)in the /projects/profile, homepage endpoint via the last name field."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T17:15Z",
    "lastModifiedDate" : "2025-08-19T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51502",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/progprnv/CVE-Reports",
          "name" : "https://github.com/progprnv/CVE-Reports",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51502",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51502",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20layout%20parameter.md",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20layout%20parameter.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Reflected Cross-Site Scripting (XSS) in Microweber CMS 2.0 via the layout parameter on the /admin/page/create page allows arbitrary JavaScript execution in the context of authenticated admin users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T17:15Z",
    "lastModifiedDate" : "2025-08-19T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-51501",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/progprnv/CVE-Reports",
          "name" : "https://github.com/progprnv/CVE-Reports",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51501",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/CVE-2025-51501",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20id%20parameter.md",
          "name" : "https://github.com/progprnv/CVE-Reports/blob/main/MICROWEBER%20%5BAdmin%20Panel%5D%20Reflected%20XSS%20on%20id%20parameter.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Reflected Cross-Site Scripting (XSS) in the id parameter of the live_edit.module_settings API endpoint in Microweber CMS2.0 allows execution of arbitrary JavaScript."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microweber:microweber:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T17:15Z",
    "lastModifiedDate" : "2025-08-19T15:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48074",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-x22w-82jp-8rvf",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-x22w-82jp-8rvf",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48074",
          "name" : "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48074",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, applications trust unvalidated dataWindow size values from file headers, which can lead to excessive memory allocation and performance degradation when processing malicious files. This is fixed in version 3.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openexr:openexr:3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-01T17:15Z",
    "lastModifiedDate" : "2025-08-13T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52327",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://restaurant.com",
          "name" : "http://restaurant.com",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://code-projects.org/real-estate-property-management-system-php-source-code/",
          "name" : "https://code-projects.org/real-estate-property-management-system-php-source-code/",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://gist.github.com/babapihai/d604a43d884a9e20c234f33865584db4",
          "name" : "https://gist.github.com/babapihai/d604a43d884a9e20c234f33865584db4",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL Injection vulnerability in Restaurant Order System 1.0 allows a local attacker to obtain sensitive information via the payment.php file"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:carmelogarcia:restaurant_order_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T16:15Z",
    "lastModifiedDate" : "2025-08-15T20:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-44139",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://emlog.com",
          "name" : "http://emlog.com",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://gist.github.com/babapihai/b56121e0b2694e2be22571057d05298e",
          "name" : "https://gist.github.com/babapihai/b56121e0b2694e2be22571057d05298e",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gist.github.com/babapihai/b56121e0b2694e2be22571057d05298e",
          "name" : "https://gist.github.com/babapihai/b56121e0b2694e2be22571057d05298e",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Emlog Pro V2.5.7 is vulnerable to Unrestricted Upload of File with Dangerous Type via /emlog/admin/plugin.php?action=upload_zip"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:emlog:emlog:2.5.7:*:*:*:pro:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T16:15Z",
    "lastModifiedDate" : "2025-08-13T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54939",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/litespeedtech/lsquic/blob/70486141724f85e97b08f510673e29f399bbae8f/CHANGELOG#L1-L3",
          "name" : "https://github.com/litespeedtech/lsquic/blob/70486141724f85e97b08f510673e29f399bbae8f/CHANGELOG#L1-L3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/litespeedtech/lsquic/commit/4cd9252e77fb4a36b572e2167a84067d603d3b23",
          "name" : "https://github.com/litespeedtech/lsquic/commit/4cd9252e77fb4a36b572e2167a84067d603d3b23",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.imperva.com/blog/quic-leak-cve-2025-54939-new-high-risk-pre-handshake-remote-denial-of-service-in-lsquic-quic-implementation/",
          "name" : "https://www.imperva.com/blog/quic-leak-cve-2025-54939-new-high-risk-pre-handshake-remote-denial-of-service-in-lsquic-quic-implementation/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "LiteSpeed QUIC (LSQUIC) Library before 4.3.1 has an lsquic_engine_packet_in memory leak."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-01T06:15Z",
    "lastModifiedDate" : "2025-08-19T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48073",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-qhpm-86v7-phmm",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-qhpm-86v7-phmm",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48073",
          "name" : "https://github.com/ShielderSec/poc/tree/main/CVE-2025-48073",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In version 3.3.2, when reading a deep scanline image with a large sample count in reduceMemory mode, it is possible to crash a target application with a NULL pointer dereference in a write operation. This is fixed in version 3.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openexr:openexr:3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-31T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48072",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/commit/2d09449427b13a05f7c31a98ab2c4347c23db361",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/commit/2d09449427b13a05f7c31a98ab2c4347c23db361",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-4r7w-q3jg-ff43",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-4r7w-q3jg-ff43",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. Version 3.3.2 is vulnerable to a heap-based buffer overflow during a read operation due to bad pointer math when decompressing DWAA-packed scan-line EXR files with a maliciously forged chunk. This is fixed in version 3.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openexr:openexr:3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-07-31T21:15Z",
    "lastModifiedDate" : "2025-08-13T20:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48071",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/commit/916cc729e24aa16b86d82813f6e136340ab2876f",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/commit/916cc729e24aa16b86d82813f6e136340ab2876f",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v3.3.3",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-h45x-qhg2-q375",
          "name" : "https://github.com/AcademySoftwareFoundation/openexr/security/advisories/GHSA-h45x-qhg2-q375",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenEXR provides the specification and reference implementation of the EXR file format, an image storage format for the motion picture industry. In versions 3.3.2 through 3.3.0, there is a heap-based buffer overflow during a write operation when decompressing ZIPS-packed deep scan-line EXR files with a maliciously forged chunk header. This is fixed in version 3.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openexr:openexr:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "3.3.0",
          "versionEndExcluding" : "3.3.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-31T21:15Z",
    "lastModifiedDate" : "2025-08-13T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45768",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/ZupeiNie/6f65e564f2067b876321d3dfdbb76569",
          "name" : "https://gist.github.com/ZupeiNie/6f65e564f2067b876321d3dfdbb76569",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jpadilla",
          "name" : "https://github.com/jpadilla",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/jpadilla/pyjwt",
          "name" : "https://github.com/jpadilla/pyjwt",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "pyjwt v2.10.1 was discovered to contain weak encryption. NOTE: this is disputed by the Supplier because the key length is chosen by the application that uses the library (admittedly, library users may benefit from a minimum value and a mechanism for opting in to strict enforcement)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-31T21:15Z",
    "lastModifiedDate" : "2025-08-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8286",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-212-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-212-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The affected products expose an unauthenticated Telnet-based command line interface that could allow an attacker to modify hardware configurations, manipulate data, or factory reset the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-31T20:15Z",
    "lastModifiedDate" : "2025-08-15T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45770",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/ZupeiNie/cd88c827eef11a1618f8baacccd240fb",
          "name" : "https://gist.github.com/ZupeiNie/cd88c827eef11a1618f8baacccd240fb",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lcobucci",
          "name" : "https://github.com/lcobucci",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lcobucci/jwt",
          "name" : "https://github.com/lcobucci/jwt",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "jwt v5.4.3 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:jwt_project:jwt:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.4.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-31T20:15Z",
    "lastModifiedDate" : "2025-08-17T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45769",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/ZupeiNie/83756316c4c24fe97a50176a92608db3",
          "name" : "https://gist.github.com/ZupeiNie/83756316c4c24fe97a50176a92608db3",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/firebase",
          "name" : "https://github.com/firebase",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/firebase/php-jwt",
          "name" : "https://github.com/firebase/php-jwt",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "php-jwt v6.11.0 was discovered to contain weak encryption. NOTE: this issue has been disputed on the basis that key lengths are expected to be set by an application, not by this library. This dispute is subject to review under CNA rules 4.1.4, 4.1.14, and other rules; the dispute tagging is not meant to recommend an outcome for this CVE Record."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:firebase_php-jwt:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "6.11.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-31T20:15Z",
    "lastModifiedDate" : "2025-08-17T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8401",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.1/htmega-blocks/includes/classes/Manage_Styles.php#L99",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.1/htmega-blocks/includes/classes/Manage_Styles.php#L99",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9540b339-3386-4ee8-8141-acb9f3d83772?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9540b339-3386-4ee8-8141-acb9f3d83772?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.9.1 via the 'get_post_data' function. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including the content of private, password-protected, and draft posts and pages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-31T12:15Z",
    "lastModifiedDate" : "2025-08-13T19:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8151",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.1/htmega-blocks/includes/classes/Manage_Styles.php#L118",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.1/htmega-blocks/includes/classes/Manage_Styles.php#L118",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b3e93bf-af5c-4ca3-a531-2d91df880c51?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6b3e93bf-af5c-4ca3-a531-2d91df880c51?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.9.1 via the 'save_block_css' function. This makes it possible for authenticated attackers, with Author-level access and above, to create CSS files in any directory, and delete CSS files in any directory in a Windows environment."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-31T12:15Z",
    "lastModifiedDate" : "2025-08-13T19:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8068",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.0/admin/include/class.theme-builder.php#L625",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/tags/2.9.0/admin/include/class.theme-builder.php#L625",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3336533/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9cf6dae-572f-4eaa-8e8a-bca9e74fe738?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d9cf6dae-572f-4eaa-8e8a-bca9e74fe738?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to unauthorized modification and loss of data due to an improper capability check on the 'ajax_trash_templates' function in all versions up to, and including, 2.9.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary attachment files, and move arbitrary posts, pages, and templates to the Trash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-31T12:15Z",
    "lastModifiedDate" : "2025-08-13T19:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7205",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/give/trunk/src/API/REST/V3/Routes/Donors/DonorNotesController.php#51",
          "name" : "https://plugins.trac.wordpress.org/browser/give/trunk/src/API/REST/V3/Routes/Donors/DonorNotesController.php#51",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3333090/give",
          "name" : "https://plugins.trac.wordpress.org/changeset/3333090/give",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39e501d8-88a0-4625-aeb0-aa33fc89a8d4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39e501d8-88a0-4625-aeb0-aa33fc89a8d4?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GiveWP – Donation Plugin and Fundraising Platform plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the donor notes parameter in all versions up to, and including, 4.5.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with GiveWP worker-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Additionally, they need to trick an administrator into visiting the legacy version of the site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.6.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-31T08:15Z",
    "lastModifiedDate" : "2025-08-13T19:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8346",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md",
          "name" : "https://github.com/CVE-Hunters/CVE/blob/main/i-educar/CVE-2025-8346.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.318296",
          "name" : "VDB-318296 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.318296",
          "name" : "VDB-318296 | Portabilis i-Educar educar_aluno_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.617706",
          "name" : "Submit #617706 | Portabilis I-Educar 2.10 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.10. Affected by this issue is some unknown functionality of the file /educar_aluno_lst.php. The manipulation of the argument ref_cod_matricula with the input \"><img%20src=x%20onerror=alert(%27CVE-Hunters%27)> leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-31T03:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8312",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0013/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0013/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Deadlock in PAM automatic check-in feature in Devolutions Server allows a password to remain valid beyond the end of its intended check-out period due to a deadlock occurring in the scheduling service.This issue affects the following version(s) :\n\n  *  \nDevolutions Server 2025.2.2.0 through 2025.2.5.0\n  *  Devolutions Server 2025.1.12.0 and earlier"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.2.7.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T16:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8321",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1328"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-712/",
          "name" : "ZDI-25-712",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Wall Connector Firmware Downgrade Vulnerability. This vulnerability allows physically present attackers to execute arbitrary code on affected installations of Tesla Wall Connector devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the firmware upgrade feature. The issue results from the lack of an anti-downgrade mechanism. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the device. Was ZDI-CAN-26299."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:wall_connector_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "24.44.3",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:wall_connector:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T01:15Z",
    "lastModifiedDate" : "2025-08-12T15:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8320",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-711/",
          "name" : "ZDI-25-711",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Wall Connector Content-Length Header Improper Input Validation Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Tesla Wall Connector devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of the HTTP Content-Length header. The issue results from the lack of proper validation of user-supplied data, which can result in memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26300."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:wall_connector_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "24.44.3",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:wall_connector:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T01:15Z",
    "lastModifiedDate" : "2025-08-12T15:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7849",
        "ASSIGNER" : "security@ni.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html",
          "name" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A memory corruption vulnerability due to improper error handling when a VILinkObj is null exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2021",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T22:15Z",
    "lastModifiedDate" : "2025-08-19T15:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7848",
        "ASSIGNER" : "security@ni.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html",
          "name" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/memory-corruption-vulnerabilities-in-ni-labview.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A memory corruption vulnerability due to improper input validation in lvpict.cpp exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2021",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T22:15Z",
    "lastModifiedDate" : "2025-08-19T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7361",
        "ASSIGNER" : "security@ni.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html",
          "name" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/code-injection-vulnerability-in-ni-labview-using-cin-nodes.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A code injection vulnerability due to an improper initialization check exists in NI LabVIEW that may result in arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI using a CIN node.  This vulnerability affects 32-bit NI LabVIEW 2025 Q1 and prior versions.  LabVIEW 64-bit versions do not support CIN nodes and are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "2021",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T22:15Z",
    "lastModifiedDate" : "2025-08-19T16:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-51473",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7240944",
          "name" : "https://www.ibm.com/support/pages/node/7240944",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5.0.0 through 10.5.0.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.2 \n\nis vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-29T19:15Z",
    "lastModifiedDate" : "2025-08-13T19:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-49828",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7240945",
          "name" : "https://www.ibm.com/support/pages/node/7240945",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes Db2 Connect Server) 10.5.0.0 through 10.5.0.11, 11.1.0 through 11.1.4.7, 11.5.0 through 11.5.9, and 12.1.0 through 12.1.2 is vulnerable to a denial of service as the server may crash under certain conditions with a specially crafted query."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "10.5.0.0",
          "versionEndIncluding" : "10.5.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndIncluding" : "11.1.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-29T19:15Z",
    "lastModifiedDate" : "2025-08-13T19:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7675",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted 3DM file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7497",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6637",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6636",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6635",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PRT file, when linked or imported into certain Autodesk products, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6631",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PRT file, when parsed through certain Autodesk products, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5043",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted 3DM file, when linked or imported into certain Autodesk products, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5038",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0015",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted X_T file, when parsed through certain Autodesk products, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:autodesk:shared_components:2026.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:3ds_max:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:infraworks:2026:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:revit_lt:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:autodesk:vault:2026:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-29T18:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3075",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3302102%40elementor&new=3302102%40elementor&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3302102%40elementor&new=3302102%40elementor&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/639693b6-369e-457e-a37e-30bdb8ea7275?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/639693b6-369e-457e-a37e-30bdb8ea7275?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Elementor Website Builder – More Than Just a Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'elementor-element' shortcode in all versions up to, and including, 3.29.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only impacts sites with 'Element Caching' enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:elementor:website_builder:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "3.29.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-29T05:15Z",
    "lastModifiedDate" : "2025-08-13T19:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4056",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-4056",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-4056",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2362826",
          "name" : "RHBZ#2362826",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://gitlab.gnome.org/GNOME/glib/-/issues/3668",
          "name" : "https://gitlab.gnome.org/GNOME/glib/-/issues/3668",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in GLib. A denial of service on Windows platforms may occur if an application attempts to spawn a program using long command lines."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:gnome:glib:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2.84.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-28T13:15Z",
    "lastModifiedDate" : "2025-08-13T19:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8197",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Maintainers have included reasons at https://gitlab.gnome.org/GNOME/libsoup/-/issues/465"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T20:15Z",
    "lastModifiedDate" : "2025-08-14T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5449",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5449",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5449",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2369705",
          "name" : "RHBZ#2369705",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=261612179f740bc62ba363d98b3bd5e5573a811f",
          "name" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=261612179f740bc62ba363d98b3bd5e5573a811f",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=3443aec90188d6aab9282afc80a81df5ab72c4da",
          "name" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=3443aec90188d6aab9282afc80a81df5ab72c4da",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=5504ff40515439a5fecbb17da7483000c4d12eb7",
          "name" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=5504ff40515439a5fecbb17da7483000c4d12eb7",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=78485f446af9b30e37eb8f177b81940710d54496",
          "name" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=78485f446af9b30e37eb8f177b81940710d54496",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb",
          "name" : "https://git.libssh.org/projects/libssh.git/commit/?h=stable-0.11&id=f79ec51b7fd519dbc5737a7ba826e3ed093f6ceb",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.libssh.org/security/advisories/CVE-2025-5449.txt",
          "name" : "https://www.libssh.org/security/advisories/CVE-2025-5449.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the SFTP server message decoding logic of libssh. The issue occurs due to an incorrect packet length check that allows an integer overflow when handling large payload sizes on 32-bit systems. This issue leads to failed memory allocation and causes the server process to crash, resulting in a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libssh:libssh:0.11.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libssh:libssh:0.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-25T18:15Z",
    "lastModifiedDate" : "2025-08-14T00:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46199",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://rapid-echo-f9c.notion.site/Grav-XSS-25-04-21-1dcaf8998a078001a2eff3dc47974d6d?pvs=4",
          "name" : "https://rapid-echo-f9c.notion.site/Grav-XSS-25-04-21-1dcaf8998a078001a2eff3dc47974d6d?pvs=4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://tyojong.tistory.com/2",
          "name" : "https://tyojong.tistory.com/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross Site Scripting vulnerability in grav v.1.7.48 and before allows an attacker to execute arbitrary code via a crafted script to the form fields"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:getgrav:grav:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.7.48",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T18:15Z",
    "lastModifiedDate" : "2025-08-15T14:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-48730",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.osmium.solutions/articles/osm-mano-vulnerability-discovery.html#2",
          "name" : "https://www.osmium.solutions/articles/osm-mano-vulnerability-discovery.html#2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The default configuration in ETSI Open-Source MANO (OSM) v.14.x, v.15.x, v.16.x, v.17.x does not impose any restrictions on the authentication attempts performed by the default admin user, allowing a remote attacker to escalate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T15:15Z",
    "lastModifiedDate" : "2025-08-18T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5039",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0014",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0014",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted binary file, when present while loading files in certain Autodesk applications, could lead to execution of arbitrary code in the context of the current process due to an untrusted search path being utilized."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_manage:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_simulate:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:vault:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-24T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8114",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-8114",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-8114",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2383220",
          "name" : "RHBZ#2383220",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in libssh, a library that implements the SSH protocol. When calculating the session ID during the key exchange (KEX) process, an allocation failure in cryptographic functions may lead to a NULL pointer dereference. This issue can cause the client or server to crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libssh:libssh:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.11.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-24T15:15Z",
    "lastModifiedDate" : "2025-08-14T00:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2634",
        "ASSIGNER" : "security@ni.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html",
          "name" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in fontmgr may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2021",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-23T16:15Z",
    "lastModifiedDate" : "2025-08-19T16:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2633",
        "ASSIGNER" : "security@ni.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html",
          "name" : "https://www.ni.com/en/support/security/available-critical-and-security-updates-for-ni-software/out-of-bounds-read-vulnerabilities-in-ni-labview.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read vulnerability due to improper bounds checking in NI LabVIEW in lvre!UDecStrToNum that may result in information disclosure or arbitrary code execution.  Successful exploitation requires an attacker to get a user to open a specially crafted VI.  This vulnerability affects NI LabVIEW 2025 Q1 and prior versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2021",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2022:q3_patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2023:q3_patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2024:q3_patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ni:labview:2025:q1_patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-23T16:15Z",
    "lastModifiedDate" : "2025-08-19T16:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54090",
        "ASSIGNER" : "security@apache.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://httpd.apache.org/security/vulnerabilities_24.html",
          "name" : "https://httpd.apache.org/security/vulnerabilities_24.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://news.ycombinator.com/item?id=44666896",
          "name" : "https://news.ycombinator.com/item?id=44666896",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A bug in Apache HTTP Server 2.4.64 results in all \"RewriteCond expr ...\" tests evaluating as \"true\".\n\n\n\nUsers are recommended to upgrade to version 2.4.65, which fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apache:http_server:2.4.64:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-23T14:15Z",
    "lastModifiedDate" : "2025-08-14T00:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-54445",
        "ASSIGNER" : "PSIRT@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.samsungtv.com/securityUpdates",
          "name" : "https://security.samsungtv.com/securityUpdates",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of XML External Entity Reference vulnerability in Samsung Electronics MagicINFO 9 Server allows Server Side Request Forgery.This issue affects MagicINFO 9 Server: less than 21.1080.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:magicinfo_9_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "21.1080.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-23T06:15Z",
    "lastModifiedDate" : "2025-08-15T14:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-8031",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1971719",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1971719",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-56/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-58/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-58/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-59/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-59/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-61/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-61/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-62/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-62/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-63/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-63/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "141.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "141.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.13.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.13.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "140.0",
          "versionEndExcluding" : "140.1.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "140.0",
          "versionEndExcluding" : "140.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-22T21:15Z",
    "lastModifiedDate" : "2025-08-15T14:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31513",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alertenterprise.com/switch-to-guardian/",
          "name" : "https://alertenterprise.com/switch-to-guardian/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "name" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://x.com/pand0rausa/status/1947477020809826359",
          "name" : "https://x.com/pand0rausa/status/1947477020809826359",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in AlertEnterprise Guardian 4.1.14.2.2.1. One can elevate to administrator privileges via the IsAdminApprover parameter in a Request%20Building%20Access requestSubmit API call. The vendor has stated that the system is protected by updating to a version equal to or greater than one of the following build numbers: 4.1.12.2.1.19, 4.1.12.5.2.36, 4.1.13.0.60, 4.1.13.2.0.3.39, 4.1.13.2.0.3.41, 4.1.13.2.42, 4.1.13.2.25.44, 4.1.14.0.13, 4.1.14.0.43, 4.1.14.0.48, and 4.1.14.1.5.32."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-22T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31512",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alertenterprise.com/switch-to-guardian/",
          "name" : "https://alertenterprise.com/switch-to-guardian/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "name" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://x.com/pand0rausa/status/1947477020809826359",
          "name" : "https://x.com/pand0rausa/status/1947477020809826359",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in AlertEnterprise Guardian 4.1.14.2.2.1. One can bypass manager approval via isAddedByApprover in a Request%20Building%20Access requestSubmit API call. The vendor has stated that the system is protected by updating to a version equal to or greater than one of the following build numbers: 4.1.12.2.1.19, 4.1.12.5.2.36, 4.1.13.0.60, 4.1.13.2.0.3.39, 4.1.13.2.0.3.41, 4.1.13.2.42, 4.1.13.2.25.44, 4.1.14.0.13, 4.1.14.0.43, 4.1.14.0.48, and 4.1.14.1.5.32."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-22T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31511",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alertenterprise.com/switch-to-guardian/",
          "name" : "https://alertenterprise.com/switch-to-guardian/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "name" : "https://alertenterprise.screenstepslive.com/a/1969949-alertenterprise-security-advisory-july-2025",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://x.com/pand0rausa/status/1947477020809826359",
          "name" : "https://x.com/pand0rausa/status/1947477020809826359",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in AlertEnterprise Guardian 4.1.14.2.2.1. One can bypass manager approval by changing the user ID in a Request%20Building%20Access requestSubmit API call. The vendor has stated that the system is protected by updating to a version equal to or greater than one of the following build numbers: 4.1.12.2.1.19, 4.1.12.5.2.36, 4.1.13.0.60, 4.1.13.2.0.3.39, 4.1.13.2.0.3.41, 4.1.13.2.42, 4.1.13.2.25.44, 4.1.14.0.13, 4.1.14.0.43, 4.1.14.0.48, and 4.1.14.1.5.32."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-22T20:15Z",
    "lastModifiedDate" : "2025-08-18T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-38335",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7240244",
          "name" : "https://www.ibm.com/support/pages/node/7240244",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security QRadar Network Threat Analytics 1.0.0 through 1.3.1 could allow a privileged user to cause a denial of service due to improper allocation of resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_network_threat_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndIncluding" : "1.3.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-22T18:15Z",
    "lastModifiedDate" : "2025-08-14T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5042",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0013",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0013",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RFA file, when parsed through Autodesk Revit, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-22T16:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6704",
        "ASSIGNER" : "security-alert@sophos.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.sophos.com/en-us/security-advisories/sophos-sa-20250721-sfos-rce",
          "name" : "https://www.sophos.com/en-us/security-advisories/sophos-sa-20250721-sfos-rce",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An arbitrary file writing vulnerability in the Secure PDF eXchange (SPX) feature of Sophos Firewall versions older than 21.0 MR2 (21.0.2) can lead to pre-auth remote code execution, if a specific configuration of SPX is enabled in combination with the firewall running in High Availability (HA) mode."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:sophos:firewall_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "21.0.2",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:sophos:firewall:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-21T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53771",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53771",
          "name" : "Microsoft SharePoint Server Spoofing Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/",
          "name" : "https://www.bleepingcomputer.com/news/microsoft/microsoft-sharepoint-zero-day-exploited-in-rce-attacks-no-patch-available/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authentication in Microsoft Office SharePoint allows an unauthorized attacker to perform spoofing over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2019:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:2016:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:sharepoint_server:*:*:*:*:subscription:*:*:*",
          "versionEndExcluding" : "16.0.18526.20508",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-20T23:15Z",
    "lastModifiedDate" : "2025-08-14T17:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7869",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README19.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README19.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.316982",
          "name" : "VDB-316982 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.316982",
          "name" : "VDB-316982 | Portabilis i-Educar Turma Module educar_turma_tipo_det.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605663",
          "name" : "https://vuldb.com/?submit.605663",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605663",
          "name" : "Submit #605663 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file intranet/educar_turma_tipo_det.php?cod_turma_tipo=ID of the component Turma Module. The manipulation of the argument nm_tipo leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-20T05:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7868",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README18.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.316981",
          "name" : "VDB-316981 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.316981",
          "name" : "VDB-316981 | Portabilis i-Educar Calendar Module educar_calendario_dia_motivo_cad.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605655",
          "name" : "https://vuldb.com/?submit.605655",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605655",
          "name" : "Submit #605655 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Portabilis i-Educar 2.9.0. Affected by this vulnerability is an unknown functionality of the file /intranet/educar_calendario_dia_motivo_cad.php of the component Calendar Module. The manipulation of the argument Motivo leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-20T05:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7867",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README17.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.316980",
          "name" : "VDB-316980 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.316980",
          "name" : "VDB-316980 | Portabilis i-Educar Agenda agenda.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605633",
          "name" : "Submit #605633 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.618639",
          "name" : "Submit #618639 | Portabilis i-Educar 2.10 Cross Site Scripting (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.628435",
          "name" : "Submit #628435 | Portabilis i-Educar 2.10 Cross Site Scripting (Duplicate)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.605633",
          "name" : "https://vuldb.com/?submit.605633",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Portabilis i-Educar 2.9.0/2.10.0. This vulnerability affects unknown code of the file /intranet/agenda.php of the component Agenda Module. The manipulation of the argument novo_titulo/novo_descricao leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-20T05:15Z",
    "lastModifiedDate" : "2025-08-19T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7866",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README16.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README16.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.316979",
          "name" : "VDB-316979 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.316979",
          "name" : "VDB-316979 | Portabilis i-Educar Disabilities Module educar_deficiencia_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.605618",
          "name" : "Submit #605618 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been rated as problematic. This issue affects some unknown processing of the file /intranet/educar_deficiencia_lst.php of the component Disabilities Module. The manipulation of the argument Deficiência ou Transtorno leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-20T04:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53762",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-183"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-53762",
          "name" : "Microsoft Purview Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Permissive list of allowed inputs in Microsoft Purview allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:purview:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.9,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-07-18T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49747",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49747",
          "name" : "Azure Machine Learning Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_machine_learning:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-18T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49746",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-49746",
          "name" : "Azure Machine Learning Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authorization in Azure Machine Learning allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_machine_learning:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-18T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47995",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47995",
          "name" : "Azure Machine Learning Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Weak authentication in Azure Machine Learning allows an authorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_machine_learning:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-18T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47158",
        "ASSIGNER" : "secure@microsoft.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-302"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-47158",
          "name" : "Azure DevOps Server Elevation of Privilege Vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authentication bypass by assumed-immutable data in Azure DevOps allows an unauthorized attacker to elevate privileges over a network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microsoft:azure_devops:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.0,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-07-18T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38349",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/521e9ff0b67c66a17d6f9593dfccafaa984aae4c",
          "name" : "https://git.kernel.org/stable/c/521e9ff0b67c66a17d6f9593dfccafaa984aae4c",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/605c18698ecfa99165f36b7f59d3ed503e169814",
          "name" : "https://git.kernel.org/stable/c/605c18698ecfa99165f36b7f59d3ed503e169814",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/6dee745bd0aec9d399df674256e7b1ecdb615444",
          "name" : "https://git.kernel.org/stable/c/6dee745bd0aec9d399df674256e7b1ecdb615444",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8c2e52ebbe885c7eeaabd3b7ddcdc1246fc400d2",
          "name" : "https://git.kernel.org/stable/c/8c2e52ebbe885c7eeaabd3b7ddcdc1246fc400d2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://project-zero.issues.chromium.org/issues/430541637",
          "name" : "https://project-zero.issues.chromium.org/issues/430541637",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\neventpoll: don't decrement ep refcount while still holding the ep mutex\n\nJann Horn points out that epoll is decrementing the ep refcount and then\ndoing a\n\n    mutex_unlock(&ep->mtx);\n\nafterwards. That's very wrong, because it can lead to a use-after-free.\n\nThat pattern is actually fine for the very last reference, because the\ncode in question will delay the actual call to \"ep_free(ep)\" until after\nit has unlocked the mutex.\n\nBut it's wrong for the much subtler \"next to last\" case when somebody\n*else* may also be dropping their reference and free the ep while we're\nstill using the mutex.\n\nNote that this is true even if that other user is also using the same ep\nmutex: mutexes, unlike spinlocks, can not be used for object ownership,\neven if they guarantee mutual exclusion.\n\nA mutex \"unlock\" operation is not atomic, and as one user is still\naccessing the mutex as part of unlocking it, another user can come in\nand get the now released mutex and free the data structure while the\nfirst user is still cleaning up.\n\nSee our mutex documentation in Documentation/locking/mutex-design.rst,\nin particular the section [1] about semantics:\n\n\t\"mutex_unlock() may access the mutex structure even after it has\n\t internally released the lock already - so it's not safe for\n\t another context to acquire the mutex and assume that the\n\t mutex_unlock() context is not using the structure anymore\"\n\nSo if we drop our ep ref before the mutex unlock, but we weren't the\nlast one, we may then unlock the mutex, another user comes in, drops\n_their_ reference and releases the 'ep' as it now has no users - all\nwhile the mutex_unlock() is still accessing it.\n\nFix this by simply moving the ep refcount dropping to outside the mutex:\nthe refcount itself is atomic, and doesn't need mutex protection (that's\nthe whole _point_ of refcounts: unlike mutexes, they are inherently\nabout object lifetimes)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-18T08:15Z",
    "lastModifiedDate" : "2025-08-19T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6230",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-196648",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-196648",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A SQL injection vulnerability was reported in Lenovo Vantage that could allow a local attacker to modify the local SQLite database and execute limited SQLite commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lenovo:commercial_vantage:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "20.2506.39.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lenovo:vantage:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.2501.20.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-07-17T20:15Z",
    "lastModifiedDate" : "2025-08-19T16:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-23266",
        "ASSIGNER" : "psirt@nvidia.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266/",
          "name" : "https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266-part-2/",
          "name" : "https://kidbomb.github.io/posts/nvidia-container-escape-cve-2025-23266-part-2/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://news.ycombinator.com/item?id=44818412",
          "name" : "https://news.ycombinator.com/item?id=44818412",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5659",
          "name" : "https://nvidia.custhelp.com/app/answers/detail/a_id/5659",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape",
          "name" : "https://www.wiz.io/blog/nvidia-ai-vulnerability-cve-2025-23266-nvidiascape",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NVIDIA Container Toolkit for all platforms contains a vulnerability in some hooks used to initialize the container, where an attacker could execute arbitrary code with elevated permissions. A successful exploit of this vulnerability might lead to escalation of privileges, data tampering, information disclosure, and denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-17T20:15Z",
    "lastModifiedDate" : "2025-08-16T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53926",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x",
          "name" : "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x",
          "name" : "https://github.com/emlog/emlog/security/advisories/GHSA-g8jx-pj5p-fm3x",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows remote attackers to inject arbitrary web script or HTML via the comment and comname parameters. Reflected XSS requires the victim to send POST requests, therefore the victim must be persuaded into clicking into sent URL. As of time of publication, no known patched versions exist."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
          "versionEndIncluding" : "2.5.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-16T16:15Z",
    "lastModifiedDate" : "2025-08-14T20:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53925",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9",
          "name" : "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9",
          "name" : "https://github.com/emlog/emlog/security/advisories/GHSA-x4wj-rhvg-hqr9",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Emlog is an open source website building system. A cross-site scripting (XSS) vulnerability in emlog up to and including pro-2.5.17 allows authenticated remote attackers to inject arbitrary web script or HTML via the file upload functionality. As an authenticated user it is possible to upload an .svg file that contains JavaScript code that is later executed. As of time of publication, no known patched versions exist."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:emlog:emlog:*:*:*:*:pro:*:*:*",
          "versionEndIncluding" : "2.5.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-16T15:15Z",
    "lastModifiedDate" : "2025-08-14T20:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53906",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
          "name" : "https://github.com/vim/vim/commit/586294a04179d855c3d1d4ee5ea83931963680b8",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-r2fw-9cw4-mj86",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vim is an open source, command line text editor. Prior to version 9.1.1551, a path traversal issue in Vim’s zip.vim plugin can allow overwriting of arbitrary files when opening specially crafted zip archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1551 contains a patch for the vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "9.1.1551",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-15T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53905",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
          "name" : "https://github.com/vim/vim/commit/87757c6b0a4b2c1f71c72ea8e1438b8fb116b239",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
          "name" : "https://github.com/vim/vim/security/advisories/GHSA-74v4-f3x9-ppvr",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vim is an open source, command line text editor. Prior to version 9.1.1552, a path traversal issue in Vim’s tar.vim plugin can allow overwriting of arbitrary files when opening specially crafted tar archives. Impact is low because this exploit requires direct user interaction. However, successfully exploitation can lead to overwriting sensitive files or placing executable code in privileged locations, depending on the permissions of the process editing the archive. The victim must edit such a file using Vim which will reveal the filename and the file content, a careful user may suspect some strange things going on. Successful exploitation could results in the ability to execute arbitrary commands on the underlying operating system. Version 9.1.1552 contains a patch for the vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "9.1.1552",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-15T21:15Z",
    "lastModifiedDate" : "2025-08-14T01:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53643",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-444"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a",
          "name" : "https://github.com/aio-libs/aiohttp/commit/e8d774f635dc6d1cd3174d0e38891da5de0e2b6a",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj",
          "name" : "https://github.com/aio-libs/aiohttp/security/advisories/GHSA-9548-qrrj-x5pj",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AIOHTTP is an asynchronous HTTP client/server framework for asyncio and Python. Prior to version 3.12.14, the Python parser is vulnerable to a request smuggling vulnerability due to not parsing trailer sections of an HTTP request. If a pure Python version of aiohttp is installed (i.e. without the usual C extensions) or AIOHTTP_NO_EXTENSIONS is enabled, then an attacker may be able to execute a request smuggling attack to bypass certain firewalls or proxy protections. Version 3.12.14 contains a patch for this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:aiohttp:aiohttp:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.12.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-14T21:15Z",
    "lastModifiedDate" : "2025-08-14T20:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45582",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
          "name" : "https://github.com/i900008/vulndb/blob/main/Gnu_tar_vuln.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html",
          "name" : "https://lists.gnu.org/archive/html/bug-tar/2025-08/msg00012.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/software/tar/",
          "name" : "https://www.gnu.org/software/tar/",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.gnu.org/software/tar/manual/html_node/Integrity.html",
          "name" : "https://www.gnu.org/software/tar/manual/html_node/Integrity.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html",
          "name" : "https://www.gnu.org/software/tar/manual/html_node/Security-rules-of-thumb.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GNU Tar through 1.35 allows file overwrite via directory traversal in crafted TAR archives, with a certain two-step process. First, the victim must extract an archive that contains a ../ symlink to a critical directory. Second, the victim must extract an archive that contains a critical file, specified via a relative pathname that begins with the symlink name and ends with that critical file's name. Here, the extraction follows the symlink and overwrites the critical file. This bypasses the protection mechanism of \"Member name contains '..'\" that would occur for a single TAR archive that attempted to specify the critical file via a ../ approach. For example, the first archive can contain \"x -> ../../../../../home/victim/.ssh\" and the second archive can contain x/authorized_keys. This can affect server applications that automatically extract any number of user-supplied TAR archives, and were relying on the blocking of traversal. This can also affect software installation processes in which \"tar xf\" is run more than once (e.g., when installing a package can automatically install two dependencies that are set up as untrusted tarballs instead of official packages). NOTE: the official GNU Tar manual has an otherwise-empty directory for each \"tar xf\" in its Security Rules of Thumb; however, third-party advice leads users to run \"tar xf\" more than once into the same directory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:tar:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-11T17:15Z",
    "lastModifiedDate" : "2025-08-18T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53634",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ctfer-io/chall-manager/commit/1385bd869142651146cd0b123085f91cec698636",
          "name" : "https://github.com/ctfer-io/chall-manager/commit/1385bd869142651146cd0b123085f91cec698636",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "name" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-ggmv-j932-q89q",
          "name" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-ggmv-j932-q89q",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. The HTTP Gateway processes headers, but with no timeout set. With a slow loris attack, an attacker could cause Denial of Service (DoS). Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 1385bd8 and shipped in v0.1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ctfer-io:chall-manager:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-10T20:15Z",
    "lastModifiedDate" : "2025-08-14T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53633",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-405"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ctfer-io/chall-manager/commit/14042aa66a577caee777e10fe09adcf2587d20dd",
          "name" : "https://github.com/ctfer-io/chall-manager/commit/14042aa66a577caee777e10fe09adcf2587d20dd",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "name" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-r7fm-3pqm-ww5w",
          "name" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-r7fm-3pqm-ww5w",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the size of the decoded content is not checked, potentially leading to zip bombs decompression. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 14042aa and shipped in v0.1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ctfer-io:chall-manager:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-10T20:15Z",
    "lastModifiedDate" : "2025-08-14T20:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53632",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ctfer-io/chall-manager/commit/47d188fda5e3f86285e820f12ad9fb6f9930662c",
          "name" : "https://github.com/ctfer-io/chall-manager/commit/47d188fda5e3f86285e820f12ad9fb6f9930662c",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "name" : "https://github.com/ctfer-io/chall-manager/releases/tag/v0.1.4",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-3gv2-v3jx-r9fh",
          "name" : "https://github.com/ctfer-io/chall-manager/security/advisories/GHSA-3gv2-v3jx-r9fh",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Chall-Manager is a platform-agnostic system able to start Challenges on Demand of a player. When decoding a scenario (i.e. a zip archive), the path of the file to write is not checked, potentially leading to zip slips. Exploitation does not require authentication nor authorization, so anyone can exploit it. It should nonetheless not be exploitable as it is highly recommended to bury Chall-Manager deep within the infrastructure due to its large capabilities, so no users could reach the system. Patch has been implemented by commit 47d188f and shipped in v0.1.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ctfer-io:chall-manager:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-07-10T20:15Z",
    "lastModifiedDate" : "2025-08-14T20:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5040",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RTE file, when parsed through Autodesk Revit, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-10T12:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5037",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0012",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RFA, RTE, or RVT file, when parsed through Autodesk Revit, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-10T12:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32990",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-32990",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-32990",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2359620",
          "name" : "RHBZ#2359620",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A heap-buffer-overflow (off-by-one) flaw was found in the GnuTLS software in the template parsing logic within the certtool utility. When it reads certain settings from a template file, it allows an attacker to cause an out-of-bounds (OOB) NULL pointer write, resulting in memory corruption and a denial-of-service (DoS) that could potentially crash the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-07-10T10:15Z",
    "lastModifiedDate" : "2025-08-15T19:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-38335",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/a7b79db25846459de63ca8974268f0c41c734c4b",
          "name" : "https://git.kernel.org/stable/c/a7b79db25846459de63ca8974268f0c41c734c4b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/a8f01e51109f77229e426b57c5d19251b462c6aa",
          "name" : "https://git.kernel.org/stable/c/a8f01e51109f77229e426b57c5d19251b462c6aa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/ec8f5da79b425deef5aebacdd4fe645620cd4f0b",
          "name" : "https://git.kernel.org/stable/c/ec8f5da79b425deef5aebacdd4fe645620cd4f0b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/f4a8f561d08e39f7833d4a278ebfb12a41eef15f",
          "name" : "https://git.kernel.org/stable/c/f4a8f561d08e39f7833d4a278ebfb12a41eef15f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/fa53beab4740c4e5fe969f218a379f9558be33dc",
          "name" : "https://git.kernel.org/stable/c/fa53beab4740c4e5fe969f218a379f9558be33dc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\nInput: gpio-keys - fix a sleep while atomic with PREEMPT_RT\n\nWhen enabling PREEMPT_RT, the gpio_keys_irq_timer() callback runs in\nhard irq context, but the input_event() takes a spin_lock, which isn't\nallowed there as it is converted to a rt_spin_lock().\n\n[ 4054.289999] BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:48\n[ 4054.290028] in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 0, name: swapper/0\n...\n[ 4054.290195]  __might_resched+0x13c/0x1f4\n[ 4054.290209]  rt_spin_lock+0x54/0x11c\n[ 4054.290219]  input_event+0x48/0x80\n[ 4054.290230]  gpio_keys_irq_timer+0x4c/0x78\n[ 4054.290243]  __hrtimer_run_queues+0x1a4/0x438\n[ 4054.290257]  hrtimer_interrupt+0xe4/0x240\n[ 4054.290269]  arch_timer_handler_phys+0x2c/0x44\n[ 4054.290283]  handle_percpu_devid_irq+0x8c/0x14c\n[ 4054.290297]  handle_irq_desc+0x40/0x58\n[ 4054.290307]  generic_handle_domain_irq+0x1c/0x28\n[ 4054.290316]  gic_handle_irq+0x44/0xcc\n\nConsidering the gpio_keys_irq_isr() can run in any context, e.g. it can\nbe threaded, it seems there's no point in requesting the timer isr to\nrun in hard irq context.\n\nRelax the hrtimer not to use the hard context."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-10T09:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32989",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-32989",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-32989",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2359621",
          "name" : "RHBZ#2359621",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A heap-buffer-overread vulnerability was found in GnuTLS in how it handles the Certificate Transparency (CT) Signed Certificate Timestamp (SCT) extension during X.509 certificate parsing. This flaw allows a malicious user to create a certificate containing a malformed SCT extension (OID 1.3.6.1.4.1.11129.2.4.2) that contains sensitive data. This issue leads to the exposure of confidential information when GnuTLS verifies certificates from certain websites when the certificate (SCT) is not checked correctly."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:gnutls:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-10T08:15Z",
    "lastModifiedDate" : "2025-08-15T19:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2670",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7239153",
          "name" : "https://www.ibm.com/support/pages/node/7239153",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM OpenPages 9.0 is vulnerable to information disclosure of sensitive information due to a weaker than expected security for certain REST end points related to workflow feature of OpenPages. An authenticated user is able to obtain certain information about Workflow related configuration and internal state."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:openpages:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.0.0",
          "versionEndExcluding" : "9.0.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-09T15:15Z",
    "lastModifiedDate" : "2025-08-14T18:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36600",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1257"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000320876/dsa-2025-205",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000320876/dsa-2025-205",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell Client Platform BIOS contains an Improper Access Control Applied to Mirrored or Aliased Memory Regions vulnerability in an externally developed component. A high privileged attacker with local access could potentially exploit this vulnerability, leading to Code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dell:latitude_12_rugged_extreme_7214_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.51.0",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dell:latitude_12_rugged_extreme_7214:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-08T15:15Z",
    "lastModifiedDate" : "2025-08-18T18:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27127",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-460466.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-460466.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TIA Project-Server (All versions < V2.1.1), TIA Project-Server V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V17 (All versions), Totally Integrated Automation Portal (TIA Portal) V18 (All versions), Totally Integrated Automation Portal (TIA Portal) V19 (All versions < V19 Update 4), Totally Integrated Automation Portal (TIA Portal) V20 (All versions < V20 Update 3). The affected application improperly handles uploaded projects in the document root. This could allow an attacker with contributor privileges to cause denial of service by uploading a malicious project."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-08T11:15Z",
    "lastModifiedDate" : "2025-08-12T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5570",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.2/classes/modules/chatbot.php#L617",
          "name" : "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.2/classes/modules/chatbot.php#L617",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a32dcf96-ec75-46b1-8f1d-608411ad5147?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a32dcf96-ec75-46b1-8f1d-608411ad5147?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AI Engine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the mwai_chatbot shortcode 'id' parameter in all versions up to, and including, 2.8.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:meowapps:ai_engine:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.8.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-08T03:15Z",
    "lastModifiedDate" : "2025-08-13T19:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36014",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7239003",
          "name" : "https://www.ibm.com/support/pages/node/7239003",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Integration Bus for z/OS 10.1.0.0 through 10.1.0.5 is vulnerable to code injection by a privileged user with access to the IIB install directory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:integration_bus_for_z\\/os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.1.0.0",
          "versionEndIncluding" : "10.1.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-07T17:15Z",
    "lastModifiedDate" : "2025-08-14T17:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1351",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237157",
          "name" : "https://www.ibm.com/support/pages/node/7237157",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-07T17:15Z",
    "lastModifiedDate" : "2025-08-14T00:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6811",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-449/",
          "name" : "ZDI-25-449",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mescius ActiveReports.NET TypeResolutionService Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mescius ActiveReports.NET. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the TypeResolutionService class. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25397."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mescius:activereports.net:18.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T15:15Z",
    "lastModifiedDate" : "2025-08-14T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6810",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-448/",
          "name" : "ZDI-25-448",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mescius ActiveReports.NET ReadValue Deserialization of Untrusted Data Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mescius ActiveReports.NET. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the implementation of the ReadValue method. The issue results from the lack of proper validation of user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25246."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mescius:activereports.net:18.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T15:15Z",
    "lastModifiedDate" : "2025-08-14T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6663",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.freedesktop.org/tpm/gstreamer/-/commit/eedd01ac3dfeb60e36a44bb61a6d0418454e8416",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-467/",
          "name" : "ZDI-25-467",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GStreamer H266 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of H266 sei messages. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-27381."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.26.0",
          "versionEndExcluding" : "1.26.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T15:15Z",
    "lastModifiedDate" : "2025-08-14T13:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7113",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README15.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.315024",
          "name" : "VDB-315024 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.315024",
          "name" : "VDB-315024 | Portabilis i-Educar Curricular Components Module edit cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.604879",
          "name" : "Submit #604879 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9.0. It has been classified as problematic. Affected is an unknown function of the file /module/ComponenteCurricular/edit?id=ID of the component Curricular Components Module. The manipulation of the argument Nome leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-07T05:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7112",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README14.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.315023",
          "name" : "VDB-315023 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.315023",
          "name" : "VDB-315023 | Portabilis i-Educar Function Management Module educar_funcao_det.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.604824",
          "name" : "Submit #604824 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Portabilis i-Educar 2.9.0 and classified as problematic. This issue affects some unknown processing of the file /intranet/educar_funcao_det.php?cod_funcao=COD&ref_cod_instituicao=COD of the component Function Management Module. The manipulation of the argument Função leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-07T05:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7111",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README13.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.315022",
          "name" : "VDB-315022 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.315022",
          "name" : "VDB-315022 | Portabilis i-Educar Course Module educar_curso_det.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.604822",
          "name" : "Submit #604822 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Portabilis i-Educar 2.9.0 and classified as problematic. This vulnerability affects unknown code of the file /intranet/educar_curso_det.php?cod_curso=ID of the component Course Module. The manipulation of the argument Curso leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-07T05:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7110",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README12.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.315021",
          "name" : "VDB-315021 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.315021",
          "name" : "VDB-315021 | Portabilis i-Educar School Module educar_escola_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.604802",
          "name" : "Submit #604802 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Portabilis i-Educar 2.9.0. This affects an unknown part of the file /intranet/educar_escola_lst.php of the component School Module. The manipulation of the argument Escola leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-07T04:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7109",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README11.md",
          "name" : "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README11.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.315020",
          "name" : "VDB-315020 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.315020",
          "name" : "VDB-315020 | Portabilis i-Educar Student Benefits Registration educar_aluno_beneficio_lst.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.604790",
          "name" : "Submit #604790 | Portabilis  i-Educar 2.9.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Portabilis i-Educar 2.9.0. Affected by this issue is some unknown functionality of the file /intranet/educar_aluno_beneficio_lst.php of the component Student Benefits Registration. The manipulation of the argument Benefício leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portabilis:i-educar:2.9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-13T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53186",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability that allows third-party call apps to send broadcasts without verification in the audio framework module\nImpact: Successful exploitation of this vulnerability may affect availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:12.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:3.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:13.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53185",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Virtual address reuse issue in the memory management module, which can be exploited by non-privileged users to access released memory\nImpact: Successful exploitation of this vulnerability may affect service integrity."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53178",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Permission bypass vulnerability in the calendar storage module\nImpact: Successful exploitation of this vulnerability may affect the schedule reminder function of head units."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53177",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Permission bypass vulnerability in the calendar storage module\nImpact: Successful exploitation of this vulnerability may affect the schedule syncing function of watches."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:emui:14.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:4.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53169",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of bypassing the process to start SA and use related functions on distributed cameras\nImpact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-53168",
        "ASSIGNER" : "psirt@huawei.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "name" : "https://consumer.huawei.com/en/support/bulletin/2025/7/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of bypassing the process to start SA and use related functions on distributed cameras\nImpact: Successful exploitation of this vulnerability may allow the peer device to use the camera without user awareness."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:huawei:harmonyos:5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-07T03:15Z",
    "lastModifiedDate" : "2025-08-12T14:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7061",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.314836",
          "name" : "VDB-314836 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.314836",
          "name" : "VDB-314836 | Intelbras InControl operador csv injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.600881",
          "name" : "Submit #600881 | Intelbras InControl 2.21.60.9 CSV Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.600881",
          "name" : "https://vuldb.com/?submit.600881",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Intelbras InControl up to 2.21.60.9. It has been declared as problematic. This vulnerability affects unknown code of the file /v1/operador/. The manipulation leads to csv injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:intelbras:incontrol_web:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2.21.60.0",
          "versionEndIncluding" : "2.21.60.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-04T13:15Z",
    "lastModifiedDate" : "2025-08-20T02:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-7066",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/jirafeau/Jirafeau/-/commit/79464ec6276e8eb0e0b0ad597db02b85080d2b63",
          "name" : "https://gitlab.com/jirafeau/Jirafeau/-/commit/79464ec6276e8eb0e0b0ad597db02b85080d2b63",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2022-30110",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2022-30110",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.cve.org/CVERecord?id=CVE-2024-12326",
          "name" : "https://www.cve.org/CVERecord?id=CVE-2024-12326",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Jirafeau normally prevents browser preview for text files due to the possibility that for example SVG and HTML documents could be exploited for cross site scripting. This was done by storing the MIME type of a file and allowing only browser preview for MIME types beginning with image (except for image/svg+xml, see CVE-2022-30110 and CVE-2024-12326), video and audio. However, it was possible to bypass this check by sending a manipulated MIME type containing a comma and an other MIME type like text/html (for example image/png,text/html). Browsers see multiple MIME types and text/html would takes precedence, allowing a possible attacker to do a cross-site scripting attack. The check for MIME types was enhanced to prevent a browser preview when the stored MIME type contains a comma."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:jirafeau:jirafeau:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-04T12:15Z",
    "lastModifiedDate" : "2025-08-14T14:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47479",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-compress-image-optimizer/vulnerability/wordpress-wp-compress-6-30-30-broken-authentication-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-compress-image-optimizer/vulnerability/wordpress-wp-compress-6-30-30-broken-authentication-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Weak Authentication vulnerability in AresIT WP Compress allows Authentication Abuse. This issue affects WP Compress: from n/a through 6.30.30."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpcompress:wp_compress:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "6.30.31",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-04T12:15Z",
    "lastModifiedDate" : "2025-08-14T14:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-9453",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2024-9453",
          "name" : "https://access.redhat.com/security/cve/CVE-2024-9453",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2316231",
          "name" : "RHBZ#2316231",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Red Hat OpenShift Jenkins. The bearer token is not obfuscated in the logs and potentially carries a high risk if those logs are centralized when collected. The token is typically valid for one year. This flaw allows a malicious user to jeopardize the environment if they have access to sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:jenkins:jenkins:-:*:*:*:-:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:redhat:openshift_developer_tools_and_services:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-04T09:15Z",
    "lastModifiedDate" : "2025-08-18T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6238",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.4/labs/oauth.php",
          "name" : "https://plugins.trac.wordpress.org/browser/ai-engine/tags/2.8.4/labs/oauth.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/mcp.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/mcp.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/oauth.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3321384/ai-engine/trunk/labs/oauth.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1edc84fd-8cb5-4899-9444-1b6ae3144917?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1edc84fd-8cb5-4899-9444-1b6ae3144917?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AI Engine plugin for WordPress is vulnerable to open redirect in version 2.8.4. This is due to an insecure OAuth implementation, as the 'redirect_uri' parameter is missing validation during the authorization flow. This makes it possible for unauthenticated attackers to intercept the authorization code and obtain an access token by redirecting the user to an attacker-controlled URI. Note: OAuth is disabled, the 'Meow_MWAI_Labs_OAuth' class is not loaded in the plugin in the patched version 2.8.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:meowapps:ai_engine:2.8.4:*:*:*:*:wordpress:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-04T03:15Z",
    "lastModifiedDate" : "2025-08-13T19:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5956",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L48",
          "name" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L48",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/hrm/#developers",
          "name" : "https://wordpress.org/plugins/hrm/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/28cf0f3f-0048-4da9-aa86-243479f7b974?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/28cf0f3f-0048-4da9-aa86-243479f7b974?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Human Resource Management plugin for WordPress is vulnerable to Arbitrary User Deletion due to a missing authorization within the ajax_delete_employee() function in versions 2.0.0 through 2.2.17. The plugin’s deletion handler reads the client-supplied $_POST['delete'] array and passes each ID directly to wp_delete_user() without verifying that the caller has the delete_users capability or limiting which user IDs may be removed. This makes it possible for authenticated attackers, with Employee-level access and above, to delete arbitrary accounts, including administrators."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mishubd:wp_human_resource_management:*:*:*:*:*:wordpress:*:*",
          "versionStartIncluding" : "2.0.0",
          "versionEndIncluding" : "2.2.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-07-04T03:15Z",
    "lastModifiedDate" : "2025-08-13T19:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5953",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L543",
          "name" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L543",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L591",
          "name" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L591",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L89",
          "name" : "https://plugins.trac.wordpress.org/browser/hrm/tags/2.2.17/class/employee.php#L89",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/hrm/#developers",
          "name" : "https://wordpress.org/plugins/hrm/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba33a18-429f-4a3e-b018-bdfbbe6e8482?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ba33a18-429f-4a3e-b018-bdfbbe6e8482?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Human Resource Management plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization in the ajax_insert_employee() and update_empoyee() functions in versions 2.0.0 through 2.2.17. The AJAX handler reads the client-supplied $_POST['role'] and, after basic cleaning via hrm_clean(), passes it directly to wp_insert_user() and later to $user->set_role() without verifying that the current user is allowed to assign that role. This makes it possible for authenticated attackers, with Employee-level access and above, to elevate their privileges to administrator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mishubd:wp_human_resource_management:*:*:*:*:*:wordpress:*:*",
          "versionStartIncluding" : "2.0.0",
          "versionEndIncluding" : "2.2.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-04T03:15Z",
    "lastModifiedDate" : "2025-08-13T19:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-34076",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/microweber/microweber",
          "name" : "https://github.com/microweber/microweber",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/microweber/microweber/commit/572bdc36b5b47923790016f6b961c8df53226855",
          "name" : "https://github.com/microweber/microweber/commit/572bdc36b5b47923790016f6b961c8df53226855",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/microweber/microweber/commit/98d025467128ecc24195dcb56c533febc3c91af6",
          "name" : "https://github.com/microweber/microweber/commit/98d025467128ecc24195dcb56c533febc3c91af6",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
          "name" : "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
          "name" : "https://huntr.com/bounties/09218d3f-1f6a-48ae-981c-85e86ad5ed8b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/microweber_lfi.rb",
          "name" : "https://raw.githubusercontent.com/rapid7/metasploit-framework/master/modules/auxiliary/gather/microweber_lfi.rb",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vulncheck.com/advisories/microweber-cms-lfi",
          "name" : "https://vulncheck.com/advisories/microweber-cms-lfi",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated local file inclusion vulnerability exists in Microweber CMS versions <= 1.2.11 through misuse of the backup management API. Authenticated users can abuse the /api/BackupV2/upload and /api/BackupV2/download endpoints to read arbitrary files from the underlying filesystem. By specifying an absolute file path in the src parameter of the upload request, the server may relocate or delete the target file depending on the web service user’s privileges. The corresponding download endpoint can then be used to retrieve the file contents, effectively enabling local file disclosure. This behavior stems from insufficient validation of user-supplied paths and inadequate restrictions on file access and backup logic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microweber:microweber:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.2.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-02T20:15Z",
    "lastModifiedDate" : "2025-08-20T03:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6297",
        "ASSIGNER" : "security@debian.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=ed6bbd445dd8800308c67236ba35d08004c98e82",
          "name" : "https://git.dpkg.org/cgit/dpkg/dpkg.git/commit/?id=ed6bbd445dd8800308c67236ba35d08004c98e82",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is\ndocumented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on\nadversarial .deb packages or with well compressible files, placed\ninside a directory with permissions not allowing removal by a non-root\nuser, this can end up in a DoS scenario due to causing disk quota\nexhaustion or disk full conditions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:debian:dpkg:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.22.21",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-01T17:15Z",
    "lastModifiedDate" : "2025-08-19T17:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6920",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-6920",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-6920",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2375522",
          "name" : "RHBZ#2375522",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the authentication enforcement mechanism of a model inference API in ai-inference-server. All /v1/* endpoints are expected to enforce API key validation. However, the POST /invocations endpoint failed to do so, resulting in an authentication bypass. This vulnerability allows unauthorized users to access the same inference features available on protected endpoints, potentially exposing sensitive functionality or allowing unintended access to backend resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:ai_inference_server:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-01T14:15Z",
    "lastModifiedDate" : "2025-08-18T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-45872",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dengxmenglihua/cve/blob/main/ZrLog%20Blog%20System%20SSRF%20%2B%20File%20Overwrite%20Leading%20to%20RCE%20Vulnerability.md",
          "name" : "https://github.com/dengxmenglihua/cve/blob/main/ZrLog%20Blog%20System%20SSRF%20%2B%20File%20Overwrite%20Leading%20to%20RCE%20Vulnerability.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/dengxmenglihua/cve/blob/main/ZrLog%20Blog%20System%20SSRF%20%2B%20File%20Overwrite%20Leading%20to%20RCE%20Vulnerability.md",
          "name" : "https://github.com/dengxmenglihua/cve/blob/main/ZrLog%20Blog%20System%20SSRF%20%2B%20File%20Overwrite%20Leading%20to%20RCE%20Vulnerability.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "zrlog v3.1.5 was discovered to contain a Server-Side Request Forgery (SSRF) via the downloadUrl parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zrlog:zrlog:3.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-01T14:15Z",
    "lastModifiedDate" : "2025-08-14T20:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36582",
        "ASSIGNER" : "secure@dell.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-757"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.dell.com/support/kbdoc/en-us/000338757/dsa-2025-268-security-update-for-dell-networker-selection-of-less-secure-algorithm-during-negotiation-vulnerability",
          "name" : "https://www.dell.com/support/kbdoc/en-us/000338757/dsa-2025-268-security-update-for-dell-networker-selection-of-less-secure-algorithm-during-negotiation-vulnerability",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Dell NetWorker, versions 19.12.0.1 and prior, contains a Selection of Less-Secure Algorithm During Negotiation ('Algorithm Downgrade') vulnerability. An unauthenticated attacker with remote access could potentially exploit this vulnerability, leading to Information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dell:networker:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "19.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-01T14:15Z",
    "lastModifiedDate" : "2025-08-14T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2895",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237164",
          "name" : "https://www.ibm.com/support/pages/node/7237164",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak System 2.3.3.6, 2.3.36 iFix1, 2.3.3.7, 2.3.3.7 iFix1, 2.3.4.0, 2.3.4.1, and 2.3.4.1 iFix1 is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:ifix1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.1:ifix1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-30T15:15Z",
    "lastModifiedDate" : "2025-08-14T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1991",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-191"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7238455",
          "name" : "https://www.ibm.com/support/pages/node/7238455",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Informix Dynamic Server 12.10,14.10, and15.0 could allow a remote attacker to cause a denial of service due to an integer underflow when processing packets."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:12.10:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:14.10:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:15.0:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-28T13:15Z",
    "lastModifiedDate" : "2025-08-14T01:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-38007",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237162",
          "name" : "https://www.ibm.com/support/pages/node/7237162",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak System 2.3.5.0, 2.3.3.7, 2.3.3.7 iFix1 on Power and 2.3.3.6, 2.3.3.6 iFix1, 2.3.3.6 iFix2, 2.3.4.0, 2.3.4.1 on Intel operating systems is vulnerable to HTML injection. A remote attacker could inject malicious HTML code, which when viewed, would be executed in the victim's Web browser within the security context of the hosting site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.7:ifix1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.4.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.5.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_system:2.3.3.6:ifix2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-27T15:15Z",
    "lastModifiedDate" : "2025-08-14T01:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6765",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.314075",
          "name" : "VDB-314075 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.314075",
          "name" : "VDB-314075 | Intelbras InControl HTTP PUT Request operador permission",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.599873",
          "name" : "https://vuldb.com/?submit.599873",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.599873",
          "name" : "Submit #599873 | Intelbras InControl 2.21.60.9 Improper Handling of Insufficient Permissions or Privileges",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.599880",
          "name" : "https://vuldb.com/?submit.599880",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.599880",
          "name" : "Submit #599880 | Intelbras InControl  2.21.60.9 IDOR (Duplicate)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Intelbras InControl 2.21.60.9. This issue affects some unknown processing of the file /v1/operador/ of the component HTTP PUT Request Handler. The manipulation leads to permission issues. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:intelbras:incontrol_web:2.21.60.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-27T12:15Z",
    "lastModifiedDate" : "2025-08-20T02:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49321",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-4-0-28-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-4-0-28-cross-site-scripting-xss-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Arraytics Eventin allows Reflected XSS. This issue affects Eventin: from n/a through 4.0.28."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.0.29",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-27T12:15Z",
    "lastModifiedDate" : "2025-08-14T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36034",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237604",
          "name" : "https://www.ibm.com/support/pages/node/7237604",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-26T16:15Z",
    "lastModifiedDate" : "2025-08-14T20:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5846",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/546435",
          "name" : "GitLab Issue #546435",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE affecting all versions from 16.10 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed authenticated users to assign unrelated compliance frameworks to projects by sending crafted GraphQL mutations that bypassed framework-specific permission checks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.10.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5315",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/546282",
          "name" : "GitLab Issue #546282",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3163037",
          "name" : "HackerOne Bug Bounty Report #3163037",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed authenticated users with Guest role permissions to add child items to incident work items by sending crafted API requests that bypassed UI-enforced role restrictions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3279",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/534424",
          "name" : "GitLab Issue #534424",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3067111",
          "name" : "HackerOne Bug Bounty Report #3067111",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 10.7 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed authenticated attackers to create a DoS condition by sending crafted GraphQL requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "10.7.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "10.7.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2938",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-840"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/529006",
          "name" : "GitLab Issue #529006",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3063091",
          "name" : "HackerOne Bug Bounty Report #3063091",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.3 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed authenticated users to gain elevated project privileges by requesting access to projects where role modifications during the approval process resulted in unintended permission grants."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.3.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.3.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1754",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/521619",
          "name" : "GitLab Issue #521619",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3009067",
          "name" : "HackerOne Bug Bounty Report #3009067",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed unauthenticated attackers to upload arbitrary files to public projects by sending crafted API requests, potentially leading to resource abuse and unauthorized content storage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6443",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-424/",
          "name" : "ZDI-25-424",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of remote IP addresses when processing VXLAN traffic. The issue results from the lack of validation of the remote IP address against configured values prior to allowing ingress traffic into the internal network. An attacker can leverage this vulnerability to gain access to internal network resources. Was ZDI-CAN-26415."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:mikrotik:routeros:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "7.20",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-25T22:15Z",
    "lastModifiedDate" : "2025-08-18T15:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6442",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-444"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ruby/webrick/commit/ee60354bcb84ec33b9245e1d1aa6e1f7e8132101#diff-ad02984d873efb089aa51551bc6b7d307a53e0ba1ac439e91d69c2e58a478864",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-414/",
          "name" : "ZDI-25-414",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ruby WEBrick read_header HTTP Request Smuggling Vulnerability. This vulnerability allows remote attackers to smuggle arbitrary HTTP requests on affected installations of Ruby WEBrick. This issue is exploitable when the product is deployed behind an HTTP proxy that fulfills specific conditions.\n\nThe specific flaw exists within the read_headers method. The issue results from the inconsistent parsing of terminators of HTTP headers. An attacker can leverage this vulnerability to smuggle arbitrary HTTP requests. Was ZDI-CAN-21876."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ruby-lang:webrick:*:*:*:*:*:ruby:*:*",
          "versionEndExcluding" : "1.8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-25T17:15Z",
    "lastModifiedDate" : "2025-08-18T15:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52894",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b",
          "name" : "https://github.com/openbao/openbao/commit/fe75468822a22a88318c6079425357a02ae5b77b",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-prpj-rchp-9j5h",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://openbao.org/docs/deprecation",
          "name" : "https://openbao.org/docs/deprecation",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://openbao.org/docs/deprecation/unauthed-rekey",
          "name" : "https://openbao.org/docs/deprecation/unauthed-rekey",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao's website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2.2.0",
          "versionEndExcluding" : "2.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-25T17:15Z",
    "lastModifiedDate" : "2025-08-12T20:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-52893",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin/74717",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-09-vault-may-expose-sensitive-information-in-error-logs-when-processing-malformed-data-with-the-kv-v2-plugin/74717",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/go-viper/mapstructure/commit/ed3f92181528ff776a0324107b8b55026e93766a",
          "name" : "https://github.com/go-viper/mapstructure/commit/ed3f92181528ff776a0324107b8b55026e93766a",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/go-viper/mapstructure/pull/105",
          "name" : "https://github.com/go-viper/mapstructure/pull/105",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/go-viper/mapstructure/releases/tag/v2.3.0",
          "name" : "https://github.com/go-viper/mapstructure/releases/tag/v2.3.0",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://github.com/openbao/openbao/commit/cf5e920badbf96b41253534a3fd5ff5063bf4b30",
          "name" : "https://github.com/openbao/openbao/commit/cf5e920badbf96b41253534a3fd5ff5063bf4b30",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/openbao/openbao/security/advisories/GHSA-8f5r-8cmq-7fmq",
          "name" : "https://github.com/openbao/openbao/security/advisories/GHSA-8f5r-8cmq-7fmq",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:openbao:openbao:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-25T17:15Z",
    "lastModifiedDate" : "2025-08-12T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4656",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-11-vault-vulnerable-to-recovery-key-cancellation-denial-of-service/75570",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-11-vault-vulnerable-to-recovery-key-cancellation-denial-of-service/75570",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.19.0",
          "versionEndExcluding" : "1.19.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "1.14.8",
          "versionEndExcluding" : "1.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.14.8",
          "versionEndExcluding" : "1.16.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.17.0",
          "versionEndExcluding" : "1.17.17",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hashicorp:vault:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "1.18.0",
          "versionEndExcluding" : "1.18.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-25T17:15Z",
    "lastModifiedDate" : "2025-08-13T18:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-49797",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/vu/JVNVU91819309/",
          "name" : "https://jvn.jp/en/vu/JVNVU91819309/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support.brother.com/g/s/security/",
          "name" : "https://support.brother.com/g/s/security/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000009",
          "name" : "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000009",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.toshibatec.com/information/20250625_01.html",
          "name" : "https://www.toshibatec.com/information/20250625_01.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple Brother driver installers for Windows contain a privilege escalation vulnerability. If exploited, an arbitrary program may be executed with the administrative privilege. As for the details of affected product names, model numbers, and versions, refer to the information provided by the respective vendors listed under [References]."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-25T10:15Z",
    "lastModifiedDate" : "2025-08-19T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6206",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/aiomatic-automatic-ai-content-writer/38877369#item-description__changelog",
          "name" : "https://codecanyon.net/item/aiomatic-automatic-ai-content-writer/38877369#item-description__changelog",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0ff2d6-65d2-4a54-b3e5-64b424013313?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8e0ff2d6-65d2-4a54-b3e5-64b424013313?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Aiomatic - Automatic AI Content Writer & Editor, GPT-3 & GPT-4, ChatGPT ChatBot & AI Toolkit plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'aiomatic_image_editor_ajax_submit' function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. In order to exploit the vulnerability, there must be a value entered for the Stability.AI API key. The value can be arbitrary."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:coderevolution:aiomatic:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-24T09:15Z",
    "lastModifiedDate" : "2025-08-13T13:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6485",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md",
          "name" : "https://github.com/wudipjq/my_vuln/blob/main/totolink3/vuln_34/34.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.313593",
          "name" : "VDB-313593 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.313593",
          "name" : "VDB-313593 | TOTOLINK A3002R formWlSiteSurvey os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.600727",
          "name" : "Submit #600727 | TOTOLINK A3002R V1.1.1-B20200824.0128 OS Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TOTOLINK A3002R 1.1.1-B20200824.0128. It has been classified as critical. This affects the function formWlSiteSurvey of the file /boafrm/formWlSiteSurvey. The manipulation of the argument wlanif leads to os command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:a3002r_firmware:1.1.1-b20200824.0128:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:a3002r:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-06-22T17:15Z",
    "lastModifiedDate" : "2025-08-14T20:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6217",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-408/",
          "name" : "ZDI-25-408",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PEAK-System Driver PCANFD_ADD_FILTERS Time-Of-Check Time-Of-Use Information Disclosure Vulnerability. This vulnerability allows local attackers to disclose sensitive information on affected installations of PEAK-System Driver. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the PCANFD_ADD_FILTERS IOCTL. The issue results from the lack of proper locking when performing operations on an object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the kernel. Was ZDI-CAN-24161."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:peak-system:device_driver:8.18.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-21T01:15Z",
    "lastModifiedDate" : "2025-08-18T15:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6216",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-640"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-4-and-release-7-5-2",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-410/",
          "name" : "ZDI-25-410",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allegra calculateTokenExpDate Password Recovery Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Allegra. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the password recovery mechanism. The issue results from reliance upon a predictable value when generating a password reset token. An attacker can leverage this vulnerability to bypass authentication on the application. Was ZDI-CAN-27104."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.5.2.70",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0",
          "versionEndExcluding" : "8.1.24",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-21T01:15Z",
    "lastModifiedDate" : "2025-08-18T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2023-5600",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/428268",
          "name" : "GitLab Issue #428268",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2209702",
          "name" : "HackerOne Bug Bounty Report #2209702",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE affecting all versions starting from 16.0 before 16.3.6, all versions starting from 16.4 before 16.4.2, all versions starting from 16.5 before 16.5.1. Arbitrary access to the titles of an private specific references could be leaked through the service-desk custom email template."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.4.0",
          "versionEndExcluding" : "16.4.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:16.5.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.0.0",
          "versionEndExcluding" : "16.3.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-20T20:15Z",
    "lastModifiedDate" : "2025-08-12T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-4994",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/462012",
          "name" : "GitLab Issue #462012",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2473644",
          "name" : "HackerOne Bug Bounty Report #2473644",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 16.1.0 before 16.11.5, all versions starting from 17.0 before 17.0.3, all versions starting from 17.1.0 before 17.1.1 which allowed for a CSRF attack on GitLab's GraphQL API leading to the execution of arbitrary GraphQL mutations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.1.0",
          "versionEndExcluding" : "16.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.1.0",
          "versionEndExcluding" : "16.11.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-20T19:15Z",
    "lastModifiedDate" : "2025-08-12T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-4025",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1333"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/457474",
          "name" : "GitLab Issue #457474",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2024974",
          "name" : "HackerOne Bug Bounty Report #2024974",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) condition has been discovered in GitLab CE/EE affecting all versions from 7.10 prior before 16.11.5, version 17.0 before 17.0.3, and 17.1 before 17.1.1. It is possible for an attacker to cause a denial of service using a crafted markdown page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "7.10.0",
          "versionEndExcluding" : "16.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "7.10.0",
          "versionEndExcluding" : "16.11.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-20T19:15Z",
    "lastModifiedDate" : "2025-08-12T14:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5121",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/545429",
          "name" : "GitLab Issue #545429",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3153908",
          "name" : "HackerOne Bug Bounty Report #3153908",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.11 before 17.11.4 and 18.0 before 18.0.2. A missing authorization check may have allowed compliance frameworks to be applied to projects outside the compliance framework's group."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.9,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-06-20T18:15Z",
    "lastModifiedDate" : "2025-08-12T14:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2443",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/525363",
          "name" : "GitLab Issue #525363",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3037340",
          "name" : "HackerOne Bug Bounty Report #3037340",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-20T18:15Z",
    "lastModifiedDate" : "2025-08-12T14:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5416",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5416",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5416",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2369601",
          "name" : "RHBZ#2369601",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in Keycloak that could lead to unauthorized information disclosure. While it requires an already authenticated user, the /admin/serverinfo endpoint can inadvertently provide sensitive environment information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:keycloak:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-20T16:15Z",
    "lastModifiedDate" : "2025-08-13T13:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3319",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236999",
          "name" : "https://www.ibm.com/support/pages/node/7236999",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Spectrum Protect Server 8.1 through 8.1.26 could allow attacker to bypass authentication due to improper session authentication which can result in access to unauthorized resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:spectrum_protect_server:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0.0",
          "versionEndIncluding" : "8.1.26",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-20T15:15Z",
    "lastModifiedDate" : "2025-08-13T14:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-7586",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/463866",
          "name" : "GitLab Issue #463866",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in GitLab EE affecting all versions starting from 17.0 prior to 17.0.6, starting from 17.1 prior to 17.1.4, and starting from 17.2 prior to 17.2.2, where webhook deletion audit log preserved auth credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.0.0",
          "versionEndExcluding" : "17.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-20T14:15Z",
    "lastModifiedDate" : "2025-08-12T14:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36049",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237146",
          "name" : "https://www.ibm.com/support/pages/node/7237146",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM webMethods Integration Server 10.5, 10.7, 10.11, and 10.15 \n\nis vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to execute arbitrary commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.15:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:redhat:linux:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-18T16:15Z",
    "lastModifiedDate" : "2025-08-13T14:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36048",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237144",
          "name" : "https://www.ibm.com/support/pages/node/7237144",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM webMethods Integration Server 10.5, 10.7, 10.11, and 10.15 could allow a privileged user to escalate their privileges when handling external entities due to execution with unnecessary privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:webmethods_integration:10.15:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:novell:suse_linux:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:redhat:linux:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-18T16:15Z",
    "lastModifiedDate" : "2025-08-13T14:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6196",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-6196",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-6196",
          "refsource" : "",
          "tags" : [ "Mitigation", "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2373117",
          "name" : "RHBZ#2373117",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://gitlab.gnome.org/GNOME/libgepub/-/issues/18",
          "name" : "https://gitlab.gnome.org/GNOME/libgepub/-/issues/18",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in libgepub, a library used to read EPUB files. The software mishandles file size calculations when opening specially crafted EPUB files, leading to incorrect memory allocations. This issue causes the application to crash. Known affected usage includes desktop services like Tumbler, which may process malicious files automatically when browsing directories. While no direct remote attack vectors are confirmed, any application using libgepub to parse user-supplied EPUB content could be vulnerable to a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:gnome:libgepub:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-17T15:15Z",
    "lastModifiedDate" : "2025-08-12T12:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5777",
        "ASSIGNER" : "secure@citrix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://citrixbleed.com",
          "name" : "https://citrixbleed.com",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71",
          "name" : "https://doublepulsar.com/citrixbleed-2-exploitation-started-mid-june-how-to-spot-it-f3106392aa71",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/",
          "name" : "https://horizon3.ai/attack-research/attack-blogs/cve-2025-5777-citrixbleed-2-write-up-maybe/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/",
          "name" : "https://labs.watchtowr.com/how-much-more-must-we-bleed-citrix-netscaler-memory-disclosure-citrixbleed-2-cve-2025-5777/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/",
          "name" : "https://reliaquest.com/blog/threat-spotlight-citrix-bleed-2-vulnerability-in-netscaler-adc-gateway-devices/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420",
          "name" : "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX693420",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/",
          "name" : "https://www.bleepingcomputer.com/news/security/cisa-tags-citrix-bleed-2-as-exploited-gives-agencies-a-day-to-patch/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory" ]
        }, {
          "url" : "https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/",
          "name" : "https://www.netscaler.com/blog/news/netscaler-critical-security-updates-for-cve-2025-6543-and-cve-2025-5777/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/",
          "name" : "https://www.theregister.com/2025/07/10/cisa_citrixbleed_kev/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient input validation leading to memory overread when the NetScaler is configured as a Gateway (VPN virtual server, ICA Proxy, CVPN, RDP Proxy) OR AAA virtual server"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "13.1",
          "versionEndExcluding" : "13.1-58.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "14.1",
          "versionEndExcluding" : "14.1-43.56",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
          "versionStartIncluding" : "12.1",
          "versionEndExcluding" : "12.1-55.328",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:fips:*:*:*",
          "versionStartIncluding" : "13.1",
          "versionEndExcluding" : "13.1-37.235",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_application_delivery_controller:*:*:*:*:ndcpp:*:*:*",
          "versionStartIncluding" : "13.1",
          "versionEndExcluding" : "13.1-37.235",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "13.1",
          "versionEndExcluding" : "13.1-58.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:citrix:netscaler_gateway:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "14.1",
          "versionEndExcluding" : "14.1-43.56",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-17T13:15Z",
    "lastModifiedDate" : "2025-08-14T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6170",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-6170",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-6170",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Mitigation" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2372952",
          "name" : "RHBZ#2372952",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 2.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-16T16:15Z",
    "lastModifiedDate" : "2025-08-12T13:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4565",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/protocolbuffers/protobuf/commit/17838beda2943d08b8a9d4df5b68f5f04f26d901",
          "name" : "https://github.com/protocolbuffers/protobuf/commit/17838beda2943d08b8a9d4df5b68f5f04f26d901",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Any project that uses Protobuf Pure-Python backend to parse untrusted Protocol Buffers data containing an arbitrary number of recursive groups, recursive messages or a series of SGROUP tags can be corrupted by exceeding the Python recursion limit. This can result in a Denial of service by crashing the application with a RecursionError. We recommend upgrading to version =>6.31.1 or beyond commit 17838beda2943d08b8a9d4df5b68f5f04f26d901"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:protobuf-python:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.25.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:protobuf-python:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.26.0",
          "versionEndExcluding" : "5.29.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:protobuf-python:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.30.0",
          "versionEndExcluding" : "6.31.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-16T15:15Z",
    "lastModifiedDate" : "2025-08-14T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5982",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514456",
          "name" : "GitLab Issue #514456",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE affecting all versions from 12.0 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2. Under certain conditions users could bypass IP access restrictions and view sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "17.10.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T13:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-44906",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/advisories/GHSA-h4h6-vccr-44h2",
          "name" : "https://github.com/advisories/GHSA-h4h6-vccr-44h2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/uptrace/bun/blob/1573ae7c2fffad1a7f72fd2d205e924b2fd4043b/driver/pgdriver/format.go#L62",
          "name" : "https://github.com/uptrace/bun/blob/1573ae7c2fffad1a7f72fd2d205e924b2fd4043b/driver/pgdriver/format.go#L62",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/uptrace/bun/tree/master/driver/pgdriver",
          "name" : "https://github.com/uptrace/bun/tree/master/driver/pgdriver",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf",
          "name" : "https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/",
          "name" : "https://www.sonarsource.com/blog/double-dash-double-trouble-a-subtle-sql-injection-flaw/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "uptrace pgdriver v1.2.1 was discovered to contain a SQL injection vulnerability via the appendArg function in /pgdriver/format.go. The maintainer has stated that the issue is fixed in v1.2.15."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:uptrace:pgdriver:1.2.1:*:*:*:*:go:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-12T16:15Z",
    "lastModifiedDate" : "2025-08-13T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-6021",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10630",
          "name" : "RHSA-2025:10630",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10698",
          "name" : "RHSA-2025:10698",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10699",
          "name" : "RHSA-2025:10699",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11580",
          "name" : "RHSA-2025:11580",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12098",
          "name" : "RHSA-2025:12098",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12099",
          "name" : "RHSA-2025:12099",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12199",
          "name" : "RHSA-2025:12199",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12237",
          "name" : "RHSA-2025:12237",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12239",
          "name" : "RHSA-2025:12239",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12240",
          "name" : "RHSA-2025:12240",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12241",
          "name" : "RHSA-2025:12241",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:13267",
          "name" : "RHSA-2025:13267",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:13289",
          "name" : "RHSA-2025:13289",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:13325",
          "name" : "RHSA-2025:13325",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:13335",
          "name" : "RHSA-2025:13335",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:13336",
          "name" : "RHSA-2025:13336",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-6021",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-6021",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2372406",
          "name" : "RHBZ#2372406",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-12T13:15Z",
    "lastModifiedDate" : "2025-08-14T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3473",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-277"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236356",
          "name" : "https://www.ibm.com/support/pages/node/7236356",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security Guardium 12.1 could allow a local privileged user to escalate their privileges to root due to insecure inherited permissions created by the program."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:guardium_data_protection:11.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:guardium_data_protection:12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-11T15:15Z",
    "lastModifiedDate" : "2025-08-13T14:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0163",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-204"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236314",
          "name" : "https://www.ibm.com/support/pages/node/7236314",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.0.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.0.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-11T15:15Z",
    "lastModifiedDate" : "2025-08-13T14:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4605",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Autodesk/3dsmax-usd",
          "name" : "https://github.com/Autodesk/3dsmax-usd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Autodesk/maya-usd",
          "name" : "https://github.com/Autodesk/maya-usd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0011",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0011",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted .usdc file, when loaded through Autodesk Maya, can force an uncontrolled memory allocation vulnerability. A malicious actor may leverage this vulnerability to cause a denial-of-service (DoS), or cause data corruption."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:maya:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.3.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:universal_scene_description:0.10:*:*:*:*:3ds_max:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:universal_scene_description:0.31.0:*:*:*:*:maya:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-11T14:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48879",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-140"
          }, {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/OctoPrint/OctoPrint/commit/c9c35c17bd820f19c6b12e6c0359fc0cfdd0c1ec",
          "name" : "https://github.com/OctoPrint/OctoPrint/commit/c9c35c17bd820f19c6b12e6c0359fc0cfdd0c1ec",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-9wj4-8h85-pgrw",
          "name" : "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-9wj4-8h85-pgrw",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Mitigation" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows any unauthenticated attacker to send a manipulated broken multipart/form-data request to OctoPrint and through that make the web server component become unresponsive. The issue can be triggered by a broken multipart/form-data request lacking an end boundary to any of OctoPrint's endpoints implemented through the octoprint.server.util.tornado.UploadStorageFallbackHandler request handler. The request handler will get stuck in an endless busy loop, looking for a part of the request that will never come. As Tornado is single-threaded, that will effectively block the whole web server. The vulnerability has been patched in version 1.11.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.11.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T16:15Z",
    "lastModifiedDate" : "2025-08-12T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48067",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/OctoPrint/OctoPrint/commit/9984b20773f5895a432f965b759999b16c57f7d8",
          "name" : "https://github.com/OctoPrint/OctoPrint/commit/9984b20773f5895a432f965b759999b16c57f7d8",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2",
          "name" : "https://github.com/OctoPrint/OctoPrint/security/advisories/GHSA-m9jh-jf9h-x3h2",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OctoPrint provides a web interface for controlling consumer 3D printers. OctoPrint versions up until and including 1.11.1 contain a vulnerability that allows an attacker with the FILE_UPLOAD permission to exfiltrate files from the host that OctoPrint has read access to, by moving them into the upload folder where they then can be downloaded from. This vulnerability is fixed in 1.11.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:octoprint:octoprint:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.11.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-06-10T16:15Z",
    "lastModifiedDate" : "2025-08-12T13:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5335",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe",
          "name" : "https://emsfs.autodesk.com/utility/odis/1/installer/latest/AdODIS-installer.exe",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0010",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0010",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted binary file when downloaded could lead to escalation of privileges to NT AUTHORITY/SYSTEM due to an untrusted search path being utilized in the Autodesk Installer application. Exploitation of this vulnerability may lead to code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:installer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.15",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T15:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30515",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-35"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CyberData 011209 Intercom\n \ncould allow an authenticated attacker to upload arbitrary files to multiple locations within the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cyberdata:011209_sip_emergency_intercom_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "22.0.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cyberdata:011209_sip_emergency_intercom:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-09T23:15Z",
    "lastModifiedDate" : "2025-08-12T14:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30507",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CyberData 011209 Intercom could allow an unauthenticated user to gather sensitive information through blind SQL injections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cyberdata:011209_sip_emergency_intercom_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "22.0.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cyberdata:011209_sip_emergency_intercom:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-09T23:15Z",
    "lastModifiedDate" : "2025-08-12T14:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30183",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CyberData 011209 Intercom\n does not properly store or protect web server admin credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cyberdata:011209_sip_emergency_intercom_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "22.0.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cyberdata:011209_sip_emergency_intercom:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-09T23:15Z",
    "lastModifiedDate" : "2025-08-12T14:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30184",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-155-01",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CyberData 011209 Intercom could allow an unauthenticated user access to the Web Interface through an alternate path."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cyberdata:011209_sip_emergency_intercom_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "22.0.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cyberdata:011209_sip_emergency_intercom:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-09T22:15Z",
    "lastModifiedDate" : "2025-08-12T14:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5918",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5918",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5918",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370877",
          "name" : "RHBZ#2370877",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2584",
          "name" : "https://github.com/libarchive/libarchive/pull/2584",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "name" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in the libarchive library. This flaw can be triggered when file streams are piped into bsdtar, potentially allowing for reading past the end of the file. This out-of-bounds read can lead to unintended consequences, including unpredictable program behavior, memory corruption, or a denial-of-service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.8.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-06-09T20:15Z",
    "lastModifiedDate" : "2025-08-15T18:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5917",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5917",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5917",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370874",
          "name" : "RHBZ#2370874",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2588",
          "name" : "https://github.com/libarchive/libarchive/pull/2588",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "name" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in the libarchive library. This flaw involves an 'off-by-one' miscalculation when handling prefixes and suffixes for file names. This can lead to a 1-byte write overflow. While seemingly small, such an overflow can corrupt adjacent memory, leading to unpredictable program behavior, crashes, or in specific circumstances, could be leveraged as a building block for more sophisticated exploitation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.8.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-09T20:15Z",
    "lastModifiedDate" : "2025-08-15T18:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5916",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5916",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5916",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370872",
          "name" : "RHBZ#2370872",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2568",
          "name" : "https://github.com/libarchive/libarchive/pull/2568",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "name" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in the libarchive library. This flaw involves an integer overflow that can be triggered when processing a Web Archive (WARC) file that claims to have more than INT64_MAX - 4 content bytes. An attacker could craft a malicious WARC archive to induce this overflow, potentially leading to unpredictable program behavior, memory corruption, or a denial-of-service condition within applications that process such archives using libarchive."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.8.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-06-09T20:15Z",
    "lastModifiedDate" : "2025-08-15T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5915",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5915",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5915",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370865",
          "name" : "RHBZ#2370865",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2599",
          "name" : "https://github.com/libarchive/libarchive/pull/2599",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "name" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in the libarchive library. This flaw can lead to a heap buffer over-read due to the size of a filter block potentially exceeding the Lempel-Ziv-Storer-Schieber (LZSS) window. This means the library may attempt to read beyond the allocated memory buffer, which can result in unpredictable program behavior, crashes (denial of service), or the disclosure of sensitive information from adjacent memory regions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-06-09T20:15Z",
    "lastModifiedDate" : "2025-08-15T18:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5914",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:14130",
          "name" : "RHSA-2025:14130",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:14135",
          "name" : "RHSA-2025:14135",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:14137",
          "name" : "RHSA-2025:14137",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5914",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5914",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370861",
          "name" : "RHBZ#2370861",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2598",
          "name" : "https://github.com/libarchive/libarchive/pull/2598",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "name" : "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://github.com/libarchive/libarchive/pull/2598",
          "name" : "https://github.com/libarchive/libarchive/pull/2598",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.8.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-09T20:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5481",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-324/",
          "name" : "ZDI-25-324",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante DICOM Viewer Pro DCM File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sante DICOM Viewer Pro. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a write  past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26168."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:dicom_viewer_pro:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "14.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5480",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.action1.com/blog/acknowledging-zdi-can-26767-high-severity-vulnerability-in-action1-agent/",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-323/",
          "name" : "ZDI-25-323",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Action1 Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Action1.  An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26767."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:action1:action1:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "5.218.620.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-18T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5474",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-322/",
          "name" : "ZDI-25-322",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "2BrightSparks SyncBackFree Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of 2BrightSparks SyncBackFree. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. User interaction on the part of an administrator is also required.\n\nThe specific flaw exists within the Mirror functionality. By creating a junction, an attacker can abuse the service to delete arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-26962."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:2brightsparks:syncbackfree:11.3.87.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-18T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5473",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.gimp.org/news/2025/05/18/gimp-3-0-4-released/#general-bugfixes",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-321/",
          "name" : "ZDI-25-321",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GIMP ICO File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of ICO files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26752."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gimp:gimp:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.0.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-18T16:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3485",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-2",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-254/",
          "name" : "ZDI-25-254",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allegra extractFileFromZip Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the extractFileFromZip method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26524."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "8.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-18T16:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2766",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1393"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-180/",
          "name" : "ZDI-25-180",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "70mai A510 Use of Default Password Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of 70mai A510. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the default configuration of user accounts. The configuration contains default password. An attacker can leverage this vulnerability to bypass authentication and execute arbitrary code in the context of the root. Was ZDI-CAN-24996."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:70mai:a510_firmware:1.0.40ww.2024.04.19:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:70mai:a510:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T19:15Z",
    "lastModifiedDate" : "2025-08-18T16:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47950",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://datatracker.ietf.org/doc/html/rfc9250",
          "name" : "https://datatracker.ietf.org/doc/html/rfc9250",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://github.com/coredns/coredns/commit/efaed02c6a480ec147b1f799aab7cf815b17dfe1",
          "name" : "https://github.com/coredns/coredns/commit/efaed02c6a480ec147b1f799aab7cf815b17dfe1",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/coredns/coredns/security/advisories/GHSA-cvx7-x8pj-x2gw",
          "name" : "https://github.com/coredns/coredns/security/advisories/GHSA-cvx7-x8pj-x2gw",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/quic-go/quic-go",
          "name" : "https://github.com/quic-go/quic-go",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://www.usenix.org/conference/usenixsecurity23/presentation/botella",
          "name" : "https://www.usenix.org/conference/usenixsecurity23/presentation/botella",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CoreDNS is a DNS server that chains plugins. In versions prior to 1.12.2, a Denial of Service (DoS) vulnerability exists in the CoreDNS DNS-over-QUIC (DoQ) server implementation. The server previously created a new goroutine for every incoming QUIC stream without imposing any limits on the number of concurrent streams or goroutines. A remote, unauthenticated attacker could open a large number of streams, leading to uncontrolled memory consumption and eventually causing an Out Of Memory (OOM) crash — especially in containerized or memory-constrained environments. The patch in version 1.12.2 introduces two key mitigation mechanisms: `max_streams`, which caps the number of concurrent QUIC streams per connection with a default value of `256`; and `worker_pool_size`, which Introduces a server-wide, bounded worker pool to process incoming streams with a default value of `1024`. This eliminates the 1:1 stream-to-goroutine model and ensures that CoreDNS remains resilient under high concurrency.  Some workarounds are available for those who are unable to upgrade. Disable QUIC support by removing or commenting out the `quic://` block in the Corefile, use container runtime resource limits to detect and isolate excessive memory usage, and/or monitor QUIC connection patterns and alert on anomalies."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:coredns.io:coredns:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.12.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5751",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-330/",
          "name" : "ZDI-25-330",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WOLFBOX Level 2 EV Charger Management Card Hard-coded Credentials Authentication Bypass Vulnerability. This vulnerability allows physically present attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of management cards. The issue results from the lack of personalization of management cards. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26292."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-06T16:15Z",
    "lastModifiedDate" : "2025-08-14T15:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5750",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-329/",
          "name" : "ZDI-25-329",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WOLFBOX Level 2 EV Charger tuya_svc_devos_activate_result_parse Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the secKey, localKey, stdTimeZone and devId parameters. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26294."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T16:15Z",
    "lastModifiedDate" : "2025-08-14T15:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5749",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-457"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-328/",
          "name" : "ZDI-25-328",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WOLFBOX Level 2 EV Charger BLE Encryption Keys Uninitialized Variable Authentication Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass authentication on affected installations of WOLFBOX Level 2 EV Charger devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of cryptographic keys used in vendor-specific encrypted communications. The issue results from the lack of proper initialization of a variable prior to accessing it. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-26295."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-06T16:15Z",
    "lastModifiedDate" : "2025-08-14T15:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5748",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-749"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-327/",
          "name" : "ZDI-25-327",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WOLFBOX Level 2 EV Charger LAN OTA Exposed Dangerous Method Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of WOLFBOX Level 2 EV Charger. Although authentication is required to exploit this vulnerability, the existing authentication mechanism can be bypassed.\n\nThe specific flaw exists within the Tuya communications module software. The issue results from the exposure of a method allowing the upload of crafted software images to the module. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-26349."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T16:15Z",
    "lastModifiedDate" : "2025-08-14T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5747",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-115"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-326/",
          "name" : "ZDI-25-326",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WOLFBOX Level 2 EV Charger MCU Command Parsing Misinterpretation of Input Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installatons of WOLFBOX Level 2 EV Charger devices. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of command frames received by the MCU. When parsing frames, the process does not properly detect the start of a frame, which can lead to misinterpretation of input. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the device. Was ZDI-CAN-26501."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:wolfbox:level_2_ev_charger_firmware:3.1.17:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:wolfbox:level_2_ev_charger:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-06T16:15Z",
    "lastModifiedDate" : "2025-08-14T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0620",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-552"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/06/03/8",
          "name" : "http://www.openwall.com/lists/oss-security/2025/06/03/8",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0620",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0620",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370453",
          "name" : "RHBZ#2370453",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://www.samba.org/samba/security/CVE-2025-0620.html",
          "name" : "https://www.samba.org/samba/security/CVE-2025-0620.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.21.0",
          "versionEndExcluding" : "4.21.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-06T14:15Z",
    "lastModifiedDate" : "2025-08-13T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30974",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-3-4-13-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/ajax-filter-posts/vulnerability/wordpress-post-grid-master-3-4-13-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Akhtarujjaman Shuvo Post Grid Master allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Post Grid Master: from n/a through 3.4.13."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:addonmaster:post_grid_master:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "3.4.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-06T13:15Z",
    "lastModifiedDate" : "2025-08-13T01:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48133",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/uncanny-automator/vulnerability/wordpress-uncanny-automator-6-5-0-1-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/uncanny-automator/vulnerability/wordpress-uncanny-automator-6-5-0-1-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Uncanny Owl Uncanny Automator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Uncanny Automator: from n/a through 6.4.0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:uncannyowl:uncanny_automator:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "6.5.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-05T21:15Z",
    "lastModifiedDate" : "2025-08-13T01:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30084",
        "ASSIGNER" : "security@joomla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://rsjoomla.com/",
          "name" : "https://rsjoomla.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored XSS vulnerability in RSMail! component 1.19.20 - 1.22.26 for Joomla was discovered. The issue occurs within the dashboard  component, where user-supplied input is not properly sanitized before being stored and rendered. An attacker can inject malicious JavaScript code into text fields or other input points, which is subsequently executed in the browser of any user who clicks on the crafted text in the dashboard."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rsjoomla:rsmail\\!:*:*:*:*:*:joomla\\!:*:*",
          "versionStartIncluding" : "1.19.20",
          "versionEndIncluding" : "1.22.26",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-05T14:15Z",
    "lastModifiedDate" : "2025-08-13T15:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46341",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FreshRSS/FreshRSS/commit/6bb8680ae0051b9a2ff344f17814f4fa5d844628",
          "name" : "https://github.com/FreshRSS/FreshRSS/commit/6bb8680ae0051b9a2ff344f17814f4fa5d844628",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w3m8-wcf4-h8vm",
          "name" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-w3m8-wcf4-h8vm",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, when the server is using HTTP auth via reverse proxy, it's possible to impersonate any user either via the `Remote-User` header or the `X-WebAuth-User` header by making specially crafted requests via the add feed functionality and obtaining the CSRF token via XPath scraping. The attacker has to know the IP address of the proxied FreshRSS instance and the admin's username, while also having an account on the instance. An attacker can send specially crafted requests in order to gain unauthorized access to internal services. This can also lead to privilege escalation like in the demonstrated scenario, although users that have setup OIDC are not affected by privilege escalation. Version 1.26.2 contains a patch for the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-04T21:15Z",
    "lastModifiedDate" : "2025-08-12T15:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46339",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-349"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FreshRSS/FreshRSS/commit/3776e1e48f33e80eb4b674bb64b419caf3b5a4e2",
          "name" : "https://github.com/FreshRSS/FreshRSS/commit/3776e1e48f33e80eb4b674bb64b419caf3b5a4e2",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4",
          "name" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-8f79-3q3w-43c4",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, it's possible to poison feed favicons by adding a given URL as a feed with the proxy set to an attacker-controlled one and disabled SSL verifying. The favicon hash is computed by hashing the feed URL and the salt, whilst not including the following variables: proxy address, proxy protocol, and whether SSL should be verified. Therefore it's possible to poison a favicon of a given feed by simply intercepting the response of the feed, and changing the website URL to one where a threat actor controls the feed favicon. Feed favicons can be replaced for all users by anyone. Version 1.26.2 fixes the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-04T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32015",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FreshRSS/FreshRSS/commit/54e2f9107d03c5b3bb260f38fdb2736bce449fd4",
          "name" : "https://github.com/FreshRSS/FreshRSS/commit/54e2f9107d03c5b3bb260f38fdb2736bce449fd4",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wgrq-mcwc-8f8v",
          "name" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-wgrq-mcwc-8f8v",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "FreshRSS is a self-hosted RSS feed aggregator. Prior to version 1.26.2, HTML is sanitized improperly inside the `<iframe srcdoc>` attribute, which leads to cross-site scripting (XSS) by loading an attacker's UserJS inside `<script src>`. In order to execute the attack, the attacker needs to control one of the victim's feeds and have an account on the FreshRSS instance that the victim is using. An attacker can gain access to the victim's account by exploiting this vulnerability. If the victim is an admin it would be possible to delete all users (cause damage) or execute arbitrary code on the server by modifying the update URL using fetch() via the XSS. Version 1.26.2 contains a patch for the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-04T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31482",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-vpmc-3fv2-jmgp",
          "name" : "https://github.com/FreshRSS/FreshRSS/security/advisories/GHSA-vpmc-3fv2-jmgp",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "FreshRSS is a self-hosted RSS feed aggregator. A vulnerability in versions prior to 1.26.2 causes a user to be repeatedly logged out after fetching a malicious feed entry, effectively causing that user to suffer denial of service. Version 1.26.2 contains a patch for the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:freshrss:freshrss:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.26.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-04T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5601",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/wireshark/wireshark/-/issues/20509",
          "name" : "GitLab Issue #20509",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://www.wireshark.org/security/wnpa-sec-2025-02.html",
          "name" : "https://www.wireshark.org/security/wnpa-sec-2025-02.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.2.0",
          "versionEndExcluding" : "4.2.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.4.0",
          "versionEndExcluding" : "4.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-04T11:15Z",
    "lastModifiedDate" : "2025-08-13T15:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25022",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-260"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an unauthenticated user in the environment to obtain highly sensitive information in configuration files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25021",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow a privileged execute code in case management script creation due to the improper generation of code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25020",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 could allow an authenticated user to cause a denial of service due to improperly validating API data input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25019",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-613"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 does not invalidate session after a logout which could allow a user to impersonate another user on the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1334",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-525"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 allows web pages to be stored locally which can be read by another user on the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-45655",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235378",
          "name" : "https://www.ibm.com/support/pages/node/7235378",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Application Gateway 19.12 through 24.09 could allow a local privileged user to perform unauthorized actions due to incorrect permissions assignment."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:application_gateway:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "19.12",
          "versionEndIncluding" : "24.09",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-03T15:15Z",
    "lastModifiedDate" : "2025-08-12T20:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5497",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md",
          "name" : "https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/slackero/phpwcms/commit/41a72eca0baa9d9d0214fec97db2400bc082d2a9",
          "name" : "https://github.com/slackero/phpwcms/commit/41a72eca0baa9d9d0214fec97db2400bc082d2a9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/slackero/phpwcms/releases/tag/v1.10.9",
          "name" : "https://github.com/slackero/phpwcms/releases/tag/v1.10.9",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.310912",
          "name" : "VDB-310912 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.310912",
          "name" : "VDB-310912 | slackero phpwcms Feedimport processing.inc.php deserialization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.577999",
          "name" : "Submit #577999 | phpwcms 1.10.8 phar deserialization vulnerability",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md",
          "name" : "https://github.com/3em0/cve_repo/blob/main/phpwcms/phar%20vulnerability%20in%20phpwcms.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was detected in slackero phpwcms up to 1.9.45/1.10.8. The impacted element is an unknown function of the file include/inc_module/mod_feedimport/inc/processing.inc.php of the component Feedimport Module. Performing manipulation of the argument cnt_text results in deserialization. The attack can be initiated remotely. The exploit is now public and may be used. Upgrading to version 1.9.46 and 1.10.9 is sufficient to resolve this issue. The patch is named 41a72eca0baa9d9d0214fec97db2400bc082d2a9. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpwcms:phpwcms:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.10.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-03T13:15Z",
    "lastModifiedDate" : "2025-08-20T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-48387",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/google/security-research/security/advisories/GHSA-xrg4-qp5w-2c3w",
          "name" : "https://github.com/google/security-research/security/advisories/GHSA-xrg4-qp5w-2c3w",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f",
          "name" : "https://github.com/mafintosh/tar-fs/commit/647447b572bc135c41035e82ca7b894f02b17f0f",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v",
          "name" : "https://github.com/mafintosh/tar-fs/security/advisories/GHSA-8cj5-5rvv-wf4v",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "tar-fs provides filesystem bindings for tar-stream. Versions prior to 3.0.9, 2.1.3, and 1.16.5 have an issue where an extract can write outside the specified dir with a specific tarball. This has been patched in versions 3.0.9, 2.1.3, and 1.16.5. As a workaround, use the ignore option to ignore non files/directories."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T20:15Z",
    "lastModifiedDate" : "2025-08-14T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1051",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-311/",
          "name" : "ZDI-25-311",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:sonos:era_300_firmware:81.1-58074:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:sonos:era_300:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T19:15Z",
    "lastModifiedDate" : "2025-08-15T16:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5036",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0009",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0009",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RFA file, when linked or imported into Autodesk Revit, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2026",
          "versionEndExcluding" : "2026.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4598",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-4598",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-4598",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2369242",
          "name" : "RHBZ#2369242",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/05/29/3",
          "name" : "https://www.openwall.com/lists/oss-security/2025/05/29/3",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/08/18/3",
          "name" : "https://www.openwall.com/lists/oss-security/2025/08/18/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/",
          "name" : "https://ciq.com/blog/the-real-danger-of-systemd-coredump-cve-2025-4598/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598",
          "name" : "https://blogs.oracle.com/linux/post/analysis-of-cve-2025-4598",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/06/05/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/06/05/1",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/06/05/3",
          "name" : "http://www.openwall.com/lists/oss-security/2025/06/05/3",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in systemd-coredump. This flaw allows an attacker to force a SUID process to crash and replace it with a non-SUID binary to access the original's privileged process coredump, allowing the attacker to read sensitive data, such as /etc/shadow content, loaded by the original process.\n\nA SUID binary or process has a special type of permission, which allows the process to run with the file owner's permissions, regardless of the user executing the binary. This allows the process to access more restricted data than unprivileged users or processes would be able to. An attacker can leverage this flaw by forcing a SUID process to crash and force the Linux kernel to recycle the process PID before systemd-coredump can analyze the /proc/pid/auxv file. If the attacker wins the race condition, they gain access to the original's SUID process coredump file. They can read sensitive content loaded into memory by the original binary, affecting data confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T14:15Z",
    "lastModifiedDate" : "2025-08-18T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4670",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3301852/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3301852/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/easy-digital-downloads/#developers",
          "name" : "https://wordpress.org/plugins/easy-digital-downloads/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/95c5bfc5-53b3-482f-856b-db6b6cac93a2?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/95c5bfc5-53b3-482f-856b-db6b6cac93a2?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Easy Digital Downloads – eCommerce Payments and Subscriptions made easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's edd_receipt shortcode in all versions up to, and including, 3.3.8.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:awesomemotive:easy_digital_downloads:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.3.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-29T09:15Z",
    "lastModifiedDate" : "2025-08-12T19:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5262",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1962421",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1962421",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-45/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-45/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-46/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-46/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 139 and Thunderbird < 128.11."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-27T13:15Z",
    "lastModifiedDate" : "2025-08-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4783",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.7.9.1/assets/js/elements-js/countdown-timer.js",
          "name" : "https://plugins.trac.wordpress.org/browser/exclusive-addons-for-elementor/tags/2.7.9.1/assets/js/elements-js/countdown-timer.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec41956f-eefc-4c8b-ade1-2a3a0f3d86df?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ec41956f-eefc-4c8b-ade1-2a3a0f3d86df?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the HTML attributes of the Countdown Timer Widget in all versions up to, and including, 2.7.9.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.7.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-27T00:15Z",
    "lastModifiedDate" : "2025-08-12T20:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2018-25110",
        "ASSIGNER" : "oss-report@checkmarx.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2018/CVE-2018-25110",
          "name" : "https://github.com/Checkmarx/Vulnerabilities-Proofs-of-Concept/tree/main/2018/CVE-2018-25110",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/markedjs/marked/commit/20bfc106013ed45713a21672ad4a34df94dcd485",
          "name" : "https://github.com/markedjs/marked/commit/20bfc106013ed45713a21672ad4a34df94dcd485",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/markedjs/marked/issues/1070",
          "name" : "https://github.com/markedjs/marked/issues/1070",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/markedjs/marked/pull/1083",
          "name" : "https://github.com/markedjs/marked/pull/1083",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Marked prior to version 0.3.17 is vulnerable to a Regular Expression Denial of Service (ReDoS) attack due to catastrophic backtracking in several regular expressions used for parsing HTML tags and markdown links. An attacker can exploit this vulnerability by providing specially crafted markdown input, such as deeply nested or repetitively structured brackets or tag attributes, which cause the parser to hang and lead to a Denial of Service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:marked_project:marked:*:*:*:*:*:node.js:*:*",
          "versionEndExcluding" : "0.3.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-23T15:15Z",
    "lastModifiedDate" : "2025-08-13T15:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47539",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-4-0-26-privilege-escalation-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/wp-event-solution/vulnerability/wordpress-eventin-4-0-26-privilege-escalation-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Privilege Assignment vulnerability in Themewinter Eventin allows Privilege Escalation. This issue affects Eventin: from n/a through 4.0.26."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.0.27",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-23T13:15Z",
    "lastModifiedDate" : "2025-08-13T15:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-5024",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10631",
          "name" : "RHSA-2025:10631",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10635",
          "name" : "RHSA-2025:10635",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:10742",
          "name" : "RHSA-2025:10742",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11403",
          "name" : "RHSA-2025:11403",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11404",
          "name" : "RHSA-2025:11404",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11405",
          "name" : "RHSA-2025:11405",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11406",
          "name" : "RHSA-2025:11406",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11407",
          "name" : "RHSA-2025:11407",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11408",
          "name" : "RHSA-2025:11408",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:11418",
          "name" : "RHSA-2025:11418",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-5024",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-5024",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2367717",
          "name" : "RHBZ#2367717",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/merge_requests/321",
          "name" : "https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/merge_requests/321",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in gnome-remote-desktop. Once gnome-remote-desktop listens for RDP connections, an unauthenticated attacker can exhaust system resources and repeatedly crash the process. There may be a resource leak after many attacks, which will also result in gnome-remote-desktop no longer being able to open files even after it is restarted via systemd."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T15:16Z",
    "lastModifiedDate" : "2025-08-12T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4123",
        "ASSIGNER" : "security@grafana.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://grafana.com/blog/2025/05/23/grafana-security-release-medium-and-high-severity-security-fixes-for-cve-2025-4123-and-cve-2025-3580/",
          "name" : "https://grafana.com/blog/2025/05/23/grafana-security-release-medium-and-high-severity-security-fixes-for-cve-2025-4123-and-cve-2025-3580/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://grafana.com/security/security-advisories/cve-2025-4123/",
          "name" : "https://grafana.com/security/security-advisories/cve-2025-4123/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.\n\nThe default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.18",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndExcluding" : "11.2.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.3.0",
          "versionEndExcluding" : "11.3.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.5.0",
          "versionEndExcluding" : "11.5.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:10.4.18:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:11.2.9:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:11.3.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:11.4.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:11.5.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:11.6.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:12.0.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.4.0",
          "versionEndExcluding" : "11.4.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:grafana:grafana:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.6.0",
          "versionEndExcluding" : "11.6.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-22T08:15Z",
    "lastModifiedDate" : "2025-08-15T19:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3887",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/06/msg00017.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/06/msg00017.html",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Mailing List" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-267/",
          "name" : "ZDI-25-267",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GStreamer H265 Codec Parsing Stack-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GStreamer. Interaction with this library is required to exploit this vulnerability but attack vectors may vary depending on the implementation.\n\nThe specific flaw exists within the parsing of H265 slice headers. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26596."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndExcluding" : "1.26.1",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-13T15:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3885",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-251/",
          "name" : "ZDI-25-251",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Harman Becker MGU21 Bluetooth Improper Input Validation Denial-of-Service Vulnerability. This vulnerability allows network-adjacent attackers to create a denial-of-service condition on affected installations of Harman Becker MGU21 devices. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Bluetooth stack of the BCM89359 chipset. The issue results from the lack of proper validation of Bluetooth frames. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-23942."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:samsung:harman_mgu21_firmware:mgu21_22-07:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:samsung:harman_mgu21:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-15T16:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3884",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-250/",
          "name" : "ZDI-25-250",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cloudera Hue Ace Editor Directory Traversal Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of Cloudera Hue. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Ace Editor web application. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-24332."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cloudera:hue:4.11.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-15T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3883",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-249/",
          "name" : "ZDI-25-249",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "eCharge Hardy Barth cPH2 index.php Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of GET parameters provided to the index.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23115."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:hardy-barth:cph2_echarge_firmware:2.0.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:hardy-barth:cph2_echarge:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-13T16:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3882",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-248/",
          "name" : "ZDI-25-248",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "eCharge Hardy Barth cPH2 nwcheckexec.php dest Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the dest parameter provided to the nwcheckexec.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23114."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:hardy-barth:cph2_echarge_firmware:2.0.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:hardy-barth:cph2_echarge:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-13T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3881",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-247/",
          "name" : "ZDI-25-247",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "eCharge Hardy Barth cPH2 check_req.php ntp Command Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of eCharge Hardy Barth cPH2 charging stations. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the ntp parameter provided to the check_req.php endpoint. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of the www-data user. Was ZDI-CAN-23113."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:hardy-barth:cph2_echarge_firmware:2.0.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:hardy-barth:cph2_echarge:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-13T16:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3486",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://alltena.com/en/resources/release-notes/release-notes-for-release-8-1-2",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Release Notes", "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-255/",
          "name" : "ZDI-25-255",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Allegra isZipEntryValide Directory Traversal Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Allegra. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the isZipEntryValide method. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to execute code in the context of LOCAL SERVICE. Was ZDI-CAN-25730."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:alltena:allegra:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "8.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-15T16:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3480",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          }, {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-246/",
          "name" : "ZDI-25-246",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MedDream WEB DICOM Viewer Cleartext Transmission of Credentials Information Disclosure Vulnerability. This vulnerability allows network-adjacent attackers to disclose sensitive information on affected installations of MedDream WEB DICOM Viewer. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the Web Portal. The issue results from the lack of encryption when transmitting credentials. An attacker can leverage this vulnerability to disclose transmitted credentials, leading to further compromise. Was ZDI-CAN-25842."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:meddream:pacs_server:7.3.2.840:*:*:*:premium:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-15T16:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2759",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-268/",
          "name" : "ZDI-25-268",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GStreamer Incorrect Permission Assignment Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of GStreamer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the product installer. The issue results from incorrect permissions on folders. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of a target user. Was ZDI-CAN-25448."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gstreamer_project:gstreamer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.25.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-22T01:15Z",
    "lastModifiedDate" : "2025-08-13T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-47277",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.vllm.ai/en/latest/deployment/security.html",
          "name" : "https://docs.vllm.ai/en/latest/deployment/security.html",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://github.com/vllm-project/vllm/commit/0d6e187e88874c39cda7409cf673f9e6546893e7",
          "name" : "https://github.com/vllm-project/vllm/commit/0d6e187e88874c39cda7409cf673f9e6546893e7",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vllm-project/vllm/pull/15988",
          "name" : "https://github.com/vllm-project/vllm/pull/15988",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-hjq4-87xh-g4fv",
          "name" : "https://github.com/vllm-project/vllm/security/advisories/GHSA-hjq4-87xh-g4fv",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "vLLM, an inference and serving engine for large language models (LLMs), has an issue in versions 0.6.5 through 0.8.4 that ONLY impacts environments using the `PyNcclPipe` KV cache transfer integration with the V0 engine. No other configurations are affected. vLLM supports the use of the `PyNcclPipe` class to establish a peer-to-peer communication domain for data transmission between distributed nodes. The GPU-side KV-Cache transmission is implemented through the `PyNcclCommunicator` class, while CPU-side control message passing is handled via the `send_obj` and `recv_obj` methods on the CPU side.? The intention was that this interface should only be exposed to a private network using the IP address specified by the `--kv-ip` CLI parameter. The vLLM documentation covers how this must be limited to a secured network. The default and intentional behavior from PyTorch is that the `TCPStore` interface listens on ALL interfaces, regardless of what IP address is provided. The IP address given was only used as a client-side address to use. vLLM was fixed to use a workaround to force the `TCPStore` instance to bind its socket to a specified private interface. As of version 0.8.5, vLLM limits the `TCPStore` socket to the private interface as configured."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vllm:vllm:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.6.5",
          "versionEndExcluding" : "0.8.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-20T18:15Z",
    "lastModifiedDate" : "2025-08-13T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46725",
        "ASSIGNER" : "security-advisories@github.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2b2a6",
          "name" : "https://github.com/langroid/langroid/commit/0d9e4a7bb3ae2eef8d38f2e970ff916599a2b2a6",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/langroid/langroid/security/advisories/GHSA-22c2-9gwg-mj59",
          "name" : "https://github.com/langroid/langroid/security/advisories/GHSA-22c2-9gwg-mj59",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Langroid is a Python framework to build large language model (LLM)-powered applications. Prior to version 0.53.15, `LanceDocChatAgent` uses pandas eval() through `compute_from_docs()`. As a result, an attacker may be able to make the agent run malicious commands through `QueryPlan.dataframe_calc]`) compromising the host system. Langroid 0.53.15 sanitizes input to the affected function by default to tackle the most common attack vectors, and added several warnings about the risky behavior in the project documentation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:langroid:langroid:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.53.15",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-20T18:15Z",
    "lastModifiedDate" : "2025-08-13T16:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4876",
        "ASSIGNER" : "disclosure@connectwise.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md",
          "name" : "https://github.com/packetlabs/vulnerability-advisory/blob/main/Disclosures/PL-2025-11315/README.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ConnectWise-Password-Encryption-Utility.exe in ConnectWise Risk Assessment allows an attacker to extract a hardcoded AES decryption key via reverse engineering. This key is embedded in plaintext within the binary and used in cryptographic operations without dynamic key management. Once obtained the key can be used to decrypt CSV input files used for authenticated network scanning."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:connectwise:risk_assessment:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2023-07-01",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-19T16:15Z",
    "lastModifiedDate" : "2025-08-13T16:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52879",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge",
          "name" : "https://www.insyde.com/security-pledge",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "name" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, SmmUpdateVariablePropertySmi () is a SMM callback function and it uses StrCmp () to compare variable names. This action may cause a buffer over-read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.2",
          "versionEndExcluding" : "5.2.05.29.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.3",
          "versionEndExcluding" : "5.3.05.38.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.4",
          "versionEndExcluding" : "5.4.05.46.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.5",
          "versionEndExcluding" : "5.5.05.54.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.6",
          "versionEndExcluding" : "5.6.05.61.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.7",
          "versionEndExcluding" : "5.7.05.70.50",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T17:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52878",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge",
          "name" : "https://www.insyde.com/security-pledge",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "name" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, VariableServicesSetVariable () can be called by gRT_>SetVariable () or the SmmSetSensitiveVariable () or SmmInternalSetVariable () from SMM. In VariableServicesSetVariable (), it uses StrSize () to get variable name size, uses StrLen () to get variable name length and uses StrCmp () to compare strings. These actions may cause a buffer over-read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.2",
          "versionEndExcluding" : "5.2.05.29.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.3",
          "versionEndExcluding" : "5.3.05.38.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.4",
          "versionEndExcluding" : "5.4.05.46.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.5",
          "versionEndExcluding" : "5.5.05.54.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.6",
          "versionEndExcluding" : "5.6.05.61.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.7",
          "versionEndExcluding" : "5.7.05.70.50",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-52877",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.insyde.com/security-pledge",
          "name" : "https://www.insyde.com/security-pledge",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "name" : "https://www.insyde.com/security-pledge/sa-2024016/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in Insyde InsydeH2O kernel 5.2 before version 05.29.50, kernel 5.3 before version 05.38.50, kernel 5.4 before version 05.46.50, kernel 5.5 before version 05.54.50, kernel 5.6 before version 05.61.50, and kernel 5.7 before version 05.70.50. In VariableRuntimeDxe driver, callback function SmmCreateVariableLockList () calls CreateVariableLockListInSmm (). In CreateVariableLockListInSmm (), it uses StrSize () to get variable name size and it could lead to a buffer over-read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.2",
          "versionEndExcluding" : "5.2.05.29.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.3",
          "versionEndExcluding" : "5.3.05.38.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.4",
          "versionEndExcluding" : "5.4.05.46.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.5",
          "versionEndExcluding" : "5.5.05.54.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.6",
          "versionEndExcluding" : "5.6.05.61.50",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.7",
          "versionEndExcluding" : "5.7.05.70.50",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T16:15Z",
    "lastModifiedDate" : "2025-08-15T17:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2900",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233415",
          "name" : "https://www.ibm.com/support/pages/node/7233415",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Semeru Runtime 8.0.302.0 through 8.0.442.0, 11.0.12.0 through 11.0.26.0, 17.0.0.0 through 17.0.14.0, and 21.0.0.0 through 12.0.6.0 is vulnerable to a denial of service caused by a buffer overflow and subsequent crash, due to a defect in its native AES/CBC encryption implementation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.0.12.0",
          "versionEndIncluding" : "11.026.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "17.0.0.0",
          "versionEndIncluding" : "17.0.14.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "21.0.0.0",
          "versionEndIncluding" : "21.0.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:semeru_runtime:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.302.0",
          "versionEndIncluding" : "8.0.442.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-08-19T19:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-46785",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25021",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25021",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Buffer over-read in some Zoom Workplace Apps for Windows may allow an authenticated user to conduct a denial of service via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.4.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.4.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.4.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.4.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.1.17",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.1.18",
          "versionEndExcluding" : "6.2.13",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.2.14",
          "versionEndExcluding" : "6.3.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T18:15Z",
    "lastModifiedDate" : "2025-08-19T19:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3632",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          }, {
            "lang" : "en",
            "value" : "CWE-789"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233139",
          "name" : "https://www.ibm.com/support/pages/node/7233139",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM 4769 Developers Toolkit 7.0.0 through 7.5.52 could allow a remote attacker to cause a denial of service in the Hardware Security Module (HSM) due to improper memory allocation of an excessive size."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:4769_developers_toolkit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.5.62",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-12T17:15Z",
    "lastModifiedDate" : "2025-08-20T02:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1993",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-521"
          }, {
            "lang" : "en",
            "value" : "CWE-521"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233054",
          "name" : "https://www.ibm.com/support/pages/node/7233054",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10 DesignerAuthoring instances store their flows in a database that is protected by weaker than expected cryptographic algorithms that could be decrypted by a local user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.5:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.7.0:r4:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:continuous_delivery:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndIncluding" : "11.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:continuous_delivery:*:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.10.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:lts:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndIncluding" : "12.10.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.2:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12:r1:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12:r10:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.4:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.3:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.3:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.0:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.0:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-09T18:16Z",
    "lastModifiedDate" : "2025-08-20T02:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3528",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHBA-2025:9645",
          "name" : "RHBA-2025:9645",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-3528",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-3528",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2359143",
          "name" : "RHBZ#2359143",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the Mirror Registry. The quay-app container shipped as part of the Mirror Registry for OpenShift has write access to the `/etc/passwd`. This flaw allows a malicious actor with access to the container to modify the passwd file and elevate their privileges to the root user within that pod."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-09T12:15Z",
    "lastModifiedDate" : "2025-08-14T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-36525",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000150598",
          "name" : "https://my.f5.com/manage/s/article/K000150598",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a BIG-IP APM virtual server is configured to use a PingAccess profile, undisclosed requests can cause TMM to terminate. \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15.1.0",
          "versionEndExcluding" : "15.1.10.7.0.4.5-ENG",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "16.1.0",
          "versionEndExcluding" : "16.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_access_policy_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-07T22:15Z",
    "lastModifiedDate" : "2025-08-18T16:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-35995",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000149952",
          "name" : "https://my.f5.com/manage/s/article/K000149952",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a BIG-IP PEM system is licensed with URL categorization, and the URL categorization policy or an iRule with the urlcat command is enabled on a virtual server, undisclosed requests can cause the Traffic Management Microkernel (TMM) to terminate. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15.1.0",
          "versionEndExcluding" : "15.1.10.7.0.4.5-ENG",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "16.1.0",
          "versionEndExcluding" : "16.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:big-ip_policy_enforcement_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-07T22:15Z",
    "lastModifiedDate" : "2025-08-18T16:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31177",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-31177",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-31177",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2355342",
          "name" : "RHBZ#2355342",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "gnuplot is affected by a heap buffer overflow at function utf8_copy_one."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnuplot:gnuplot:6.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-07T21:16Z",
    "lastModifiedDate" : "2025-08-15T19:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20210",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-dnac-api-nBPZcJCM",
          "name" : "cisco-sa-dnac-api-nBPZcJCM",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the management API of Cisco Catalyst Center, formerly Cisco DNA Center, could allow an unauthenticated, remote attacker to read and modify the outgoing proxy configuration settings.\r\n\r\nThis vulnerability is due to the lack of authentication in an API endpoint. An attacker could exploit this vulnerability by sending a request to the affected API of a Catalyst Center device. A successful exploit could allow the attacker to view or modify the outgoing proxy configuration, which could disrupt internet traffic from Cisco Catalyst Center or may allow the attacker to intercept outbound internet traffic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_center:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.7.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-08-13T19:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-33093",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          }, {
            "lang" : "en",
            "value" : "CWE-260"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232762",
          "name" : "https://www.ibm.com/support/pages/node/7232762",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Sterling Partner Engagement Manager 6.1.0, 6.2.0, 6.2.2 JWT secret is stored in public Helm Charts and is not stored as a Kubernetes secret."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:standard:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:standard:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.1.2:*:*:*:essentials:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.0:*:*:*:essentials:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:standard:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:sterling_partner_engagement_manager:6.2.2:*:*:*:essentials:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-07T11:15Z",
    "lastModifiedDate" : "2025-08-20T02:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-4286",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-255"
          }, {
            "lang" : "en",
            "value" : "CWE-256"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Storing-password-in-insecure-format-17d27474cccb8003b647ea832186b162?pvs=4",
          "name" : "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Storing-password-in-insecure-format-17d27474cccb8003b647ea832186b162?pvs=4",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.307392",
          "name" : "VDB-307392 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.307392",
          "name" : "VDB-307392 | Intelbras InControl Dispositivos Edição Page credentials storage",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483834",
          "name" : "Submit #483834 | Intelbras InControl 2.21.57 Insecure Storage of Sensitive Information",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Intelbras InControl up to 2.21.59. It has been classified as problematic. Affected is an unknown function of the component Dispositivos Edição Page. The manipulation of the argument Senha de Comunicação leads to unprotected storage of credentials. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. According to the vendor this issue should be fixed in a later release."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:intelbras:incontrol_web:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.21.59",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-05T20:15Z",
    "lastModifiedDate" : "2025-08-20T02:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1992",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232515",
          "name" : "https://www.ibm.com/support/pages/node/7232515",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user in federation environment, to cause a denial of service due to insufficient release of allocated memory after usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:-:*:*:*",
            "versionStartIncluding" : "11.5.0",
            "versionEndIncluding" : "11.5.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:12.1.0:*:*:*:-:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:12.1.1:*:*:*:-:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-05T17:18Z",
    "lastModifiedDate" : "2025-08-20T02:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1838",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-602"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232429",
          "name" : "https://www.ibm.com/support/pages/node/7232429",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak for Business Automation\n\n 24.0.0 and 24.0.1 through 24.0.1 IF001 \n\nAuthoring allows an authenticated user to bypass client-side data validation in an authoring user interface which could cause a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_002:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_003:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_004:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-03T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1495",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232434",
          "name" : "https://www.ibm.com/support/pages/node/7232434",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Business Automation Workflow 24.0.0 and 24.0.1 through 24.0.1 IF001 Center may leak sensitive information due to missing authorization validation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:*:*:*:traditional:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:-:*:*:containers:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:interim_fix_001:*:*:containers:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-03T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-41753",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232197",
          "name" : "https://www.ibm.com/support/pages/node/7232197",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak for Business Automation 24.0.0 through 24.0.0 IF004 and 24.0.1 through 24.0.1 IF001 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_002:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_003:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_004:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-03T16:15Z",
    "lastModifiedDate" : "2025-08-14T01:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2082",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-265/",
          "name" : "ZDI-25-265",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model 3 VCSEC Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Tesla Model 3 vehicles. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the VCSEC module. By manipulating the certificate response sent from the Tire Pressure Monitoring System (TPMS), an attacker can trigger an integer overflow before writing to memory. An attacker can leverage this vulnerability to execute code in the context of the VCSEC module and send arbitrary messages to the vehicle CAN bus. Was ZDI-CAN-23800."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_3_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.14",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-6032",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-264/",
          "name" : "ZDI-25-264",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model S Iris Modem ql_atfwd Command Injection Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target system in order to exploit this vulnerability.\n \nThe specific flaw exists within the ql_atfwd process. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code on the target modem in the context of root. Was ZDI-CAN-23201."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.8",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-6031",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-261/",
          "name" : "ZDI-25-261",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model S oFono AT Command Heap-based Buffer Overflow Code Execution Vulnerability. This vulnerability allows local attackers to execute arbitrary code on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code on the target modem in order to exploit this vulnerability.\n \nThe specific flaw exists within the parsing of responses from AT commands. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the device. Was ZDI-CAN-23198."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.2",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-6030",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-263/",
          "name" : "ZDI-25-263",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model S oFono Unnecessary Privileges Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected Tesla Model S vehicles. An attacker must first obtain the ability to execute code within the sandbox on the target system in order to exploit this vulnerability.\n \nThe specific flaw exists within the oFono process. The process allows an attacker to modify interfaces. An attacker can leverage this vulnerability to bypass the iptables network sandbox. Was ZDI-CAN-23200."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.8",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-6029",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-260/",
          "name" : "ZDI-25-260",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model S Iris Modem Race Condition Firewall Bypass Vulnerability. This vulnerability allows network-adjacent attackers to bypass the firewall on the Iris modem in affected Tesla Model S vehicles. Authentication is not required to exploit this vulnerability.\n \nThe specific flaw exists within the firewall service. The issue results from a failure to obtain the xtables lock. An attacker can leverage this vulnerability to bypass firewall rules. Was ZDI-CAN-23197."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.2.3",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-13943",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-262/",
          "name" : "ZDI-25-262",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Tesla Model S Iris Modem QCMAP_ConnectionManager Improper Input Validation Sandbox Escape Vulnerability. This vulnerability allows local attackers to escape the sandbox on affected affected Tesla Model S vehicles. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the QCMAP_ConnectionManager component. An attacker can abuse the service to assign LAN addresses to the WWAN. An attacker can leverage this vulnerability to access network services that were only intended to be exposed to the internal LAN. Was ZDI-CAN-23199."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tesla:model_s_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "2024.8",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tesla:model_s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-30T20:15Z",
    "lastModifiedDate" : "2025-08-12T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3910",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:4335",
          "name" : "RHSA-2025:4335",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:4336",
          "name" : "RHSA-2025:4336",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-3910",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-3910",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2361923",
          "name" : "RHBZ#2361923",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/keycloak/keycloak/issues/39349",
          "name" : "https://github.com/keycloak/keycloak/issues/39349",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Keycloak. The org.keycloak.authorization package may be vulnerable to circumventing required actions, allowing users to circumvent requirements such as setting up two-factor authentication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:build_of_keycloak:*:*:*:*:text-only:*:*:*",
          "versionStartIncluding" : "26.0",
          "versionEndExcluding" : "26.0.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-04-29T21:15Z",
    "lastModifiedDate" : "2025-08-18T15:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32980",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.netscout.com/securityadvisories",
          "name" : "https://www.netscout.com/securityadvisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NETSCOUT nGeniusONE before 6.4.0 P11 b3245 has a Weak Sudo Configuration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-25T21:15Z",
    "lastModifiedDate" : "2025-08-18T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2986",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231785",
          "name" : "https://www.ibm.com/support/pages/node/7231785",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Maximo Asset Management 7.6.1.3 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-25T12:15Z",
    "lastModifiedDate" : "2025-08-13T00:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3604",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/flynax-bridge/trunk/request.php",
          "name" : "https://plugins.trac.wordpress.org/browser/flynax-bridge/trunk/request.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/935caa43-4c75-47ad-a631-63988e21f834?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/935caa43-4c75-47ad-a631-63988e21f834?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like email. This makes it possible for unauthenticated attackers to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:flynax:flynax_bridge:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-24T09:15Z",
    "lastModifiedDate" : "2025-08-12T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-3603",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-620"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/flynax-bridge/trunk/request.php",
          "name" : "https://plugins.trac.wordpress.org/browser/flynax-bridge/trunk/request.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa8124db-ee6a-481d-88c6-4cc84fefcf1c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fa8124db-ee6a-481d-88c6-4cc84fefcf1c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Flynax Bridge plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 2.2.0. This is due to the plugin not properly validating a user's identity prior to updating their details like password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:flynax:flynax_bridge:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-24T09:15Z",
    "lastModifiedDate" : "2025-08-12T17:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-25046",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231333",
          "name" : "https://www.ibm.com/support/pages/node/7231333",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM InfoSphere Information Server 11.7 DataStage Flow Designer \n\ntransmits sensitive information via URL or query parameters that could be exposed to an unauthorized actor using man in the middle techniques."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:-:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-23T23:15Z",
    "lastModifiedDate" : "2025-08-12T17:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2771",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-184/",
          "name" : "ZDI-25-184",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "BEC Technologies Multiple Routers Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of BEC Technologies routers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the web-based user interface. The issue results from the lack of authentication prior to allowing access to functionality. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25894."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:bectechnologies:router_firmware:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-18T15:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2770",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          }, {
            "lang" : "en",
            "value" : "CWE-256"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-186/",
          "name" : "ZDI-25-186",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "BEC Technologies Multiple Routers Cleartext Password Storage Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of BEC Technologies routers. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the web-based user interface. The issue results from storing credentials in a recoverable format. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-25986."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:bectechnologies:router_firmware:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-15T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2769",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-183/",
          "name" : "ZDI-25-183",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25295."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bdrive:netdrive:3.17.960:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-14T14:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2768",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-182/",
          "name" : "ZDI-25-182",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bdrive NetDrive Uncontrolled Search Path Element Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Bdrive NetDrive. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the configuration of OpenSSL. The product loads an OpenSSL configuration file from an unsecured location. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-25041."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bdrive:netdrive:3.17.960:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-14T14:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2767",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-181/",
          "name" : "ZDI-25-181",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Arista NG Firewall User-Agent Cross-Site Scripting Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Arista NG Firewall. Minimal user interaction is required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of the User-Agent HTTP header. The issue results from the lack of proper validation of user-supplied data, which can lead to the injection of an arbitrary script. An attacker can leverage this vulnerability to execute code in the context of root. Was ZDI-CAN-24407."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arista:ng_firewall:17.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.6,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-14T14:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2761",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-204/",
          "name" : "ZDI-25-204",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GIMP FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of FLI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25100."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gimp:gimp:2.10.38:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-14T15:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2760",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-203/",
          "name" : "ZDI-25-203",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "GIMP XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25082."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gimp:gimp:2.10.38:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-14T15:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1951",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231389",
          "name" : "https://www.ibm.com/support/pages/node/7231389",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands as a privileged user due to execution of commands with unnecessary privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.2.1030.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.3.1050.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-22T15:16Z",
    "lastModifiedDate" : "2025-08-12T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1950",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-114"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231507",
          "name" : "https://www.ibm.com/support/pages/node/7231507",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands locally due to improper validation of libraries of an untrusted source."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.2.1030.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.3.1050.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-22T15:16Z",
    "lastModifiedDate" : "2025-08-14T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2987",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231390",
          "name" : "https://www.ibm.com/support/pages/node/7231390",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Maximo Asset Management 7.6.1.3 is vulnerable to server-side request forgery (SSRF). This may allow an authenticated attacker to send unauthorized requests from the system, potentially leading to network enumeration or facilitating other attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:maximo_asset_management:7.6.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-04-22T00:15Z",
    "lastModifiedDate" : "2025-08-13T00:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2022-47112",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/boofish/semantic-bugs/",
          "name" : "https://github.com/boofish/semantic-bugs/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "7-Zip 22.01 does not report an error for certain invalid xz files, involving stream flags and reserved bits. Some later versions are unaffected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:7-zip:7-zip:22.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-19T21:15Z",
    "lastModifiedDate" : "2025-08-18T16:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2022-47111",
        "ASSIGNER" : "cve@mitre.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/boofish/semantic-bugs/",
          "name" : "https://github.com/boofish/semantic-bugs/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "7-Zip 22.01 does not report an error for certain invalid xz files, involving block flags and reserved bits. Some later versions are unaffected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:7-zip:7-zip:22.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-19T21:15Z",
    "lastModifiedDate" : "2025-08-18T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-37925",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://git.kernel.org/stable/c/28419a4f3a1eeee33472a1b3856ae62aaa5a649b",
          "name" : "https://git.kernel.org/stable/c/28419a4f3a1eeee33472a1b3856ae62aaa5a649b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/45fd8421081ec79e661e5f3ead2934fdbddb4287",
          "name" : "https://git.kernel.org/stable/c/45fd8421081ec79e661e5f3ead2934fdbddb4287",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8987891c4653874d5e3f5d11f063912f4e0b58eb",
          "name" : "https://git.kernel.org/stable/c/8987891c4653874d5e3f5d11f063912f4e0b58eb",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.kernel.org/stable/c/8c3f9a70d2d4dd6c640afe294b05c6a0a45434d9",
          "name" : "https://git.kernel.org/stable/c/8c3f9a70d2d4dd6c640afe294b05c6a0a45434d9",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://git.kernel.org/stable/c/afc08b0b5587b553799bc375957706936a3e0088",
          "name" : "https://git.kernel.org/stable/c/afc08b0b5587b553799bc375957706936a3e0088",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the Linux kernel, the following vulnerability has been resolved:\n\njfs: reject on-disk inodes of an unsupported type\n\nSyzbot has reported the following BUG:\n\nkernel BUG at fs/inode.c:668!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 3 UID: 0 PID: 139 Comm: jfsCommit Not tainted 6.12.0-rc4-syzkaller-00085-g4e46774408d9 #0\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-3.fc41 04/01/2014\nRIP: 0010:clear_inode+0x168/0x190\nCode: 4c 89 f7 e8 ba fe e5 ff e9 61 ff ff ff 44 89 f1 80 e1 07 80 c1 03 38 c1 7c c1 4c 89 f7 e8 90 ff e5 ff eb b7\n 0b e8 01 5d 7f ff 90 0f 0b e8 f9 5c 7f ff 90 0f 0b e8 f1 5c 7f\nRSP: 0018:ffffc900027dfae8 EFLAGS: 00010093\nRAX: ffffffff82157a87 RBX: 0000000000000001 RCX: ffff888104d4b980\nRDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000\nRBP: ffffc900027dfc90 R08: ffffffff82157977 R09: fffff520004fbf38\nR10: dffffc0000000000 R11: fffff520004fbf38 R12: dffffc0000000000\nR13: ffff88811315bc00 R14: ffff88811315bda8 R15: ffff88811315bb80\nFS:  0000000000000000(0000) GS:ffff888135f00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00005565222e0578 CR3: 0000000026ef0000 CR4: 00000000000006f0\nCall Trace:\n <TASK>\n ? __die_body+0x5f/0xb0\n ? die+0x9e/0xc0\n ? do_trap+0x15a/0x3a0\n ? clear_inode+0x168/0x190\n ? do_error_trap+0x1dc/0x2c0\n ? clear_inode+0x168/0x190\n ? __pfx_do_error_trap+0x10/0x10\n ? report_bug+0x3cd/0x500\n ? handle_invalid_op+0x34/0x40\n ? clear_inode+0x168/0x190\n ? exc_invalid_op+0x38/0x50\n ? asm_exc_invalid_op+0x1a/0x20\n ? clear_inode+0x57/0x190\n ? clear_inode+0x167/0x190\n ? clear_inode+0x168/0x190\n ? clear_inode+0x167/0x190\n jfs_evict_inode+0xb5/0x440\n ? __pfx_jfs_evict_inode+0x10/0x10\n evict+0x4ea/0x9b0\n ? __pfx_evict+0x10/0x10\n ? iput+0x713/0xa50\n txUpdateMap+0x931/0xb10\n ? __pfx_txUpdateMap+0x10/0x10\n jfs_lazycommit+0x49a/0xb80\n ? _raw_spin_unlock_irqrestore+0x8f/0x140\n ? lockdep_hardirqs_on+0x99/0x150\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_default_wake_function+0x10/0x10\n ? __kthread_parkme+0x169/0x1d0\n ? __pfx_jfs_lazycommit+0x10/0x10\n kthread+0x2f2/0x390\n ? __pfx_jfs_lazycommit+0x10/0x10\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x4d/0x80\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n </TASK>\n\nThis happens when 'clear_inode()' makes an attempt to finalize an underlying\nJFS inode of unknown type. According to JFS layout description from\nhttps://jfs.sourceforge.net/project/pub/jfslayout.pdf, inode types from 5 to\n15 are reserved for future extensions and should not be encountered on a valid\nfilesystem. So add an extra check for valid inode type in 'copy_from_dinode()'."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "3.1",
          "versionEndExcluding" : "6.14.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-18T07:15Z",
    "lastModifiedDate" : "2025-08-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-29931",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-130"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-395348.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-395348.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected product does not properly validate a length field in a serialized message which it uses to determine the amount of memory to be allocated for deserialization. This could allow an unauthenticated remote attacker to cause the application to allocate exhaustive amounts of memory and subsequently create a partial denial of service condition.\r\nSuccessful exploitation is only possible in redundant Telecontrol Server Basic setups and only if the connection between the redundant servers has been disrupted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-17T11:15Z",
    "lastModifiedDate" : "2025-08-19T14:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32872",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetOverview' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32871",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'MigrateDatabase' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32870",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetTraces' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32869",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ImportCertificate' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32868",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ExportCertificate' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32867",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32866",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetLogs' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32865",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateLog' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32864",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32863",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32862",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32861",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateTraceLevelSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32860",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockWebServerGatewaySettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32859",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockWebServerGatewaySettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32858",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateWebServerGatewaySettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32857",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockBufferingSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32856",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockBufferingSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32855",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockOpcSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32854",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockOpcSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32853",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockDatabaseSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32852",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockDatabaseSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32851",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockTcmSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32850",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockTcmSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32849",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockSmtpSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32848",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockSmtpSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32847",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockGeneralSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32846",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockGeneralSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32845",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateGeneralSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32844",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockUser' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32843",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockUser' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32842",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetUsers' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32841",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockGateway' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32840",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockGateway' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32839",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetGateways' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32838",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ImportConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32837",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetActiveConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32836",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32835",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariableArchivingBuffering' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32834",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariablesWithImport' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32833",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProjectUserRights' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32832",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockProjectUserRights' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32831",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateProjectUserRights' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32830",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32829",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockProjectCrossCommunications' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32828",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateProjectCrossCommunications' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32827",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ActivateProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32826",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetActiveProjects' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32825",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'GetProjects' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32824",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UnlockProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32823",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'LockProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32822",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'DeleteProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-32475",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25912)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31353",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateOpcSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25916)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31352",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateGateways' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25915)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31351",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateProject' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25917)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31350",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateBufferingSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25918)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31349",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateSmtpSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25919)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-31343",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateTcmSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25920)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30032",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateDatabaseSettings' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25921)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30031",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateUsers' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25922)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30030",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'ImportDatabase' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25924)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30003",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateProjectConnections' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25910)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-30002",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'UpdateConnectionVariables' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25909)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-29905",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'RestoreFromBackup' method. This could allow an authenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25923)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27540",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'Authenticate' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25913)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27539",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'VerifyUser' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on.  (ZDI-CAN-25914)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-27495",
        "ASSIGNER" : "productcert@siemens.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "name" : "https://cert-portal.siemens.com/productcert/html/ssa-443402.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been identified in TeleControl Server Basic (All versions < V3.1.2.2). The affected application is vulnerable to SQL injection through the internally used 'CreateTrace' method. This could allow an unauthenticated remote attacker to bypass authorization controls, to read from and write to the application's database and execute code with \"NT AUTHORITY\\NetworkService\" permissions. A successful attack requires the attacker to be able to access port 8000 on a system where a vulnerable version of the affected application is executed on. (ZDI-CAN-25911)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siemens:telecontrol_server_basic:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-16T18:16Z",
    "lastModifiedDate" : "2025-08-19T14:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2024-22314",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-327"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7229903",
          "name" : "https://www.ibm.com/support/pages/node/7229903",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : 