Datasets:
cve_id stringlengths 13 15 | summary stringlengths 17 4k | description_hash stringlengths 64 64 | published_date timestamp[us, tz=UTC]date 2025-06-07 05:15:24 2025-09-05 00:15:32 | modified_date timestamp[us, tz=UTC]date 2025-06-07 23:15:21 2025-09-05 01:00:01 | is_rejected bool 2
classes | source stringclasses 1
value | source_url stringclasses 6
values | retrieved_at timestamp[us, tz=UTC]date 2025-09-05 02:12:28 2025-09-05 02:12:28 | source_record_hash stringlengths 64 64 |
|---|---|---|---|---|---|---|---|---|---|
CVE-2025-47601 | Missing Authorization vulnerability in Christiaan Pieterse MaxiBlocks allows Privilege Escalation.This issue affects MaxiBlocks: from n/a through 2.1.0. | 37432d6a84378b45eae6bfb43e2b5d3b89bc1f1eacff500ce929398b7c915a22 | 2025-06-07T05:15:24.213000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | c7ea51863c98ff0dcc16d28b393bd787888605ce0dbfd08b233d43be6d835567 |
CVE-2025-5814 | The Profiler – What Slowing Down Your WP plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wpsd_plugin_control() function in all versions up to, and including, 1.0.0. This makes it possible for unauthenticated attackers to reactivate previously deactivated ... | fa9f8385cce746e6d75b9477fe792c905e01c49cd4d3b6932923dd722884ff36 | 2025-06-07T05:15:24.913000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 7c3a5915ea83bd1ad084332356e4ede9359b7b1286e1fd278194a2d903df9a1b |
CVE-2025-5399 | Due to a mistake in libcurl's WebSocket code, a malicious server can send a
particularly crafted packet which makes libcurl get trapped in an endless
busy-loop.
There is no other way for the application to escape or exit this loop other
than killing the thread/process.
This might be used to DoS libcurl-using applicat... | 582bb77384da0cf5c328bb3576615660d138c27d63cfc28691c3c488be672de5 | 2025-06-07T08:15:20.687000 | 2025-07-30T19:41:33.457000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 0fed46809ed3af4b41e90018f5af51c9c484f8fea218d44f21e0a286d9341f10 |
CVE-2025-5303 | The LTL Freight Quotes – Freightview Edition, LTL Freight Quotes – Daylight Edition and LTL Freight Quotes – Day & Ross Edition plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the expiry_date parameter in all versions up to, and including, 1.0.11, 2.2.6 and 2.1.10 respectively, due to insufficie... | 4e2c88250f795ca63f9dc02a857fb19409037c275baf3b38e18416178a95f87c | 2025-06-07T09:15:22.007000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 98512bb64980f86cb19899da0ad5de9e9d349547eb51b3aa5e588105f98e72ca |
CVE-2024-9993 | The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_event_details_text parameter of Event Calendar Widget in all versions up to, and including, 6.1.12 due to insufficient input sanitizat... | f8f9639eefdf65317a3b60e2f31d9750c2220fe98546caf061895f32bc9f1115 | 2025-06-07T12:15:21.360000 | 2025-07-14T16:42:49.460000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8adb94e3e53ceace0bec196900bb2c854560bdad55ad67efd7be44a7be3cb894 |
CVE-2024-9994 | The Essential Addons for Elementor – Best Elementor Addon, Templates, Widgets, Kits & WooCommerce Builders plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the eael_pricing_item_tooltip_content parameter of the Pricing Table Widget in all versions up to, and including, 6.1.12 due to insufficient in... | ad9f53db4b141acbf01e681fe8f3262a1d21c5451277b203c5893be308980bb7 | 2025-06-07T12:15:22.963000 | 2025-07-14T16:42:29.187000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 5fea3483672a8352f6515edd588551c95fb061d0bfba2fc72574b3f75fa1a310 |
CVE-2025-5528 | The Social Sharing Plugin – Sassy Social Share plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the heateor_mastodon_share parameter in all versions up to, and including, 3.3.75 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to in... | a64cb699c1bca8ce05754a88fc96492038c8c5e9159b8c845ed8b85c41186889 | 2025-06-07T12:15:23.157000 | 2025-07-14T17:26:28.117000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | beba5fc0473460cce011890147e05449d11c03ba58e8fadb47491c06fc860873 |
CVE-2025-5568 | The WpEvently plugin for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in all versions up to, and including, 4.4.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary... | f3977c09f2fab6b76d6eefcd15f2646ec598fed4e6e4a957362df2691f0f5f5d | 2025-06-07T12:15:23.370000 | 2025-07-15T17:09:32.110000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 66ac8f98301c74a63c20600b113c2fe91af81e59876dbf4226de78ccb99ef8c9 |
CVE-2025-49619 | Skyvern through 0.1.85 is vulnerable to server-side template injection (SSTI) in the Prompt field of workflow blocks such as the Navigation v2 Block. Improper sanitization of Jinja2 template input allows authenticated users to inject crafted expressions that are evaluated on the server, leading to blind remote code exe... | 26e04e6bb1135de9362c582ab9f9a4983f073ef767c552a9e34a707cb8f4b5d1 | 2025-06-07T14:15:21.573000 | 2025-06-17T21:15:40.087000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 99a463de9815f7834b71ebe303d6fcf5017c938d7e5e0e8d0adaa23615e9142c |
CVE-2025-5836 | A vulnerability was found in Tenda AC9 15.03.02.13. It has been rated as critical. This issue affects the function formSetIptv of the file /goform/SetIPTVCfg of the component POST Request Handler. The manipulation of the argument list leads to command injection. The attack may be initiated remotely. The exploit has bee... | 821ea285a6769a98c1f0a9e089aa0726fe59f64f22a16c7fd2e14f867554629a | 2025-06-07T14:15:22.500000 | 2025-06-09T19:07:49.417000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 6a14e267f4ef9892a19e17043bc86d52e69a6932ceed38ccaac829ca8f634bc5 |
CVE-2025-5837 | A vulnerability classified as critical has been found in PHPGurukul Employee Record Management System 1.3. Affected is an unknown function of the file /admin/allemployees.php. The manipulation of the argument delid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to t... | 0d25ff2b36b8b1101d284a3640290ae187945426f97fa13a3debdab380c8a818 | 2025-06-07T14:15:22.803000 | 2025-06-09T19:07:41.590000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | fa9c0609b001f0edddafc139edb328f0083bbd116eb74a71325d76b212506345 |
CVE-2025-5838 | A vulnerability classified as critical was found in PHPGurukul Employee Record Management System 1.3. Affected by this vulnerability is an unknown functionality of the file /admin/adminprofile.php. The manipulation of the argument AdminName leads to sql injection. The attack can be launched remotely. The exploit has be... | 11f6194f2fcf588648ee477569c6ba7432dc98e250f47111ceb57b8fcb74aa51 | 2025-06-07T16:15:23.440000 | 2025-06-10T14:56:21.530000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 47828ebccadb498b1ec226daa9543769b7a7ec4568e860a3e1522f02cd0fc306 |
CVE-2025-5839 | A vulnerability, which was classified as critical, has been found in Tenda AC9 15.03.02.13. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip of the component POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely... | 0a9ee3e3b092f9477d2a1a2176a3c418ea17e8370914f05080d770a4610122cd | 2025-06-07T18:15:25.080000 | 2025-06-09T19:07:34.470000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 65e0e635e4115f0842bf764fdd0db726d826bc499f667b478c409e9a5ac92bb5 |
CVE-2025-5840 | A vulnerability, which was classified as critical, was found in SourceCodester Client Database Management System 1.0. This affects an unknown part of the file /user_update_customer_order.php. The manipulation of the argument uploaded_file leads to unrestricted upload. It is possible to initiate the attack remotely. | a4a58cb4b5236353dcb3d717273d24c6c56e7957ee76749e05c1211560871cff | 2025-06-07T18:15:25.320000 | 2025-06-10T15:45:31.043000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 9dfe844ad85749a2412db43ed777ef07b6dd9f06b95cbb928cc5e73b15c309de |
CVE-2024-55585 | In the moPS App through 1.8.618, all users can access administrative API endpoints without additional authentication, resulting in unrestricted read and write access, as demonstrated by /api/v1/users/resetpassword. | ee9ac793e2d3ad0f9d2d95e774f38762b9cb9f01aaed3011b6192b1021f7571d | 2025-06-07T19:15:22.333000 | 2025-06-13T08:15:19.127000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e6ca2c9060a0d58180c4f44d55389d5c82bfe01757ae3e872cabdf4d0b27babb |
CVE-2025-5026 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | c9ba0a50ec3cf35bc3afb314f33b46f80e1d9966987f3e6691d226ec252035b0 | 2025-06-07T23:15:21.897000 | 2025-06-07T23:15:21.897000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | cdc40bb9051ea04e554f274539f2249bd9c989a0b87cbf10c00677182df40540 |
CVE-2025-5097 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | c9ba0a50ec3cf35bc3afb314f33b46f80e1d9966987f3e6691d226ec252035b0 | 2025-06-07T23:15:22 | 2025-06-07T23:15:22 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 46875294ea89de9715fc461039b2d7dce85b93f37b56b87db279d1ca3f4ce876 |
CVE-2025-5223 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | c9ba0a50ec3cf35bc3afb314f33b46f80e1d9966987f3e6691d226ec252035b0 | 2025-06-07T23:15:22.067000 | 2025-06-07T23:15:22.067000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | cf9eea8ad087c6f05d283068c02e2fd4d21254532c093b15300ddbc562bc1f8a |
CVE-2025-5242 | Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. | c9ba0a50ec3cf35bc3afb314f33b46f80e1d9966987f3e6691d226ec252035b0 | 2025-06-07T23:15:22.130000 | 2025-06-07T23:15:22.130000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 81e8860516ef1e9bc1226c85fb1b8aceabd83579b481029ab23e05fa95cb2664 |
CVE-2025-38003 | In the Linux kernel, the following vulnerability has been resolved:
can: bcm: add missing rcu read protection for procfs content
When the procfs content is generated for a bcm_op which is in the process
to be removed the procfs output might show unreliable data (UAF).
As the removal of bcm_op's is already implemente... | 0c9889c9a4c0819070514bd8ffdf7631c2b09651bf546fc3a5b112f00d945697 | 2025-06-08T11:15:20.990000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 6a6e83e4ffeb839b5f392c5f9af7391881b62260e6cb0204f0a192656af7fcea |
CVE-2025-38004 | In the Linux kernel, the following vulnerability has been resolved:
can: bcm: add locking for bcm_op runtime updates
The CAN broadcast manager (CAN BCM) can send a sequence of CAN frames via
hrtimer. The content and also the length of the sequence can be changed
resp reduced at runtime where the 'currframe' counter i... | c39a581c85a1295a3064759708af7b16feaacab5bd674bf4f2699413dcd7033e | 2025-06-08T11:15:22.210000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | f86008201b9e07d16c4f0fec39a34cdfcad534f760ab777dc44abc50fc3ee467 |
CVE-2025-20063 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | 35924cf71ad4fcee7abb4aa860946c7e2090fe13781d277e2e9f7a33cbb25afd | 2025-06-08T12:15:20.493000 | 2025-06-09T19:07:27.137000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 76f7f8cdbb21909e11c16039d4a943735ab9a7993efe3c2cf47f1bbe8f770a64 |
CVE-2025-21082 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion. | 35924cf71ad4fcee7abb4aa860946c7e2090fe13781d277e2e9f7a33cbb25afd | 2025-06-08T12:15:21.433000 | 2025-06-09T19:07:20.283000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 3b058f10b3aaf7c793406b50a3308eec67cab2aa800b2eb6f63c431dacb0d91e |
CVE-2025-23235 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through out-of-bounds read. | 1624ca3f6e678aa5de308b4b910fbce5a2535d4183cc2d126108427908175ced | 2025-06-08T12:15:21.590000 | 2025-06-09T19:07:15.063000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 399a99cc443681bb22cd52a24fd4677ffa3b685b4ad50353fc213839cd62f960 |
CVE-2025-24493 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through race condition. | 1ccf68eea7425e758fd3c6fa4961c15533d76d1f8359c71100dc37007b67c591 | 2025-06-08T12:15:21.763000 | 2025-06-09T19:07:08.100000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 0403b32c9f285b382a017369c1ce0547e19c30b7f4d3b57af8ab1e189be83ab0 |
CVE-2025-25217 | in OpenHarmony v5.0.3 and prior versions allow a local attacker case DOS through NULL pointer dereference. | 044e796ff5eee8edb985ff7614b0ab38e8a5ea5e1d227140d6ba23be1affd737 | 2025-06-08T12:15:21.933000 | 2025-06-09T19:07:00.530000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | b74786e90094bb1ed0d9fbe556764b73321f306d543f3fd06ea57289f4204f00 |
CVE-2025-26691 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | 347a58b1331ec267d6407ec360be2f9e535af66d0fe6b9066b4086876b9dd150 | 2025-06-08T12:15:22.093000 | 2025-06-09T19:06:52.933000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | fc5816ff5d6e3062a02bec035a074d8dae3cf778dd626f0278821dcd256df0cc |
CVE-2025-26693 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | 347a58b1331ec267d6407ec360be2f9e535af66d0fe6b9066b4086876b9dd150 | 2025-06-08T12:15:22.260000 | 2025-06-09T19:06:44.900000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e3e238e419d6c23b5817c41757cc41a6275559fb6905ebe64b8400bc5aec2269 |
CVE-2025-27131 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. | 7e2020b955aa9666af8e60db48d614c68f14efc5ad7bc078dd4d329b35e92c5f | 2025-06-08T12:15:22.423000 | 2025-06-09T19:06:16.757000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | f75a6cd7dbfad440c8676079f167eaf223be05458b64fba551850342bff724f8 |
CVE-2025-27242 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause DOS through improper input. | 1b9f332fb4e68400d416a1102d269dd350b51b401eba31e2df11cb6adc246e45 | 2025-06-08T12:15:22.583000 | 2025-06-09T19:06:09.833000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e26cf478d11c6692fe5a216fbe1d67f8346090afe307b23e66ce1f9a845b5478 |
CVE-2025-27247 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | 347a58b1331ec267d6407ec360be2f9e535af66d0fe6b9066b4086876b9dd150 | 2025-06-08T12:15:22.733000 | 2025-06-09T19:05:57.987000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | fce6af92893411baf956cf7fd26ba91cdb7ee354c085ea3b374d93616fc54608 |
CVE-2025-27563 | in OpenHarmony v5.0.3 and prior versions allow a local attacker cause information leak through get permission. | 347a58b1331ec267d6407ec360be2f9e535af66d0fe6b9066b4086876b9dd150 | 2025-06-08T12:15:22.917000 | 2025-06-09T19:05:03.483000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 380b2be8f9066704831c3f37d4db7e16e17e73bed8c4b0b58b9d7c2bb6f5f035 |
CVE-2025-5847 | A vulnerability has been found in Tenda AC9 15.03.02.13 and classified as critical. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The atta... | de70e66b2d2796360181dffdc7ccec1057c9d8cd439cc77aa0b243f14553a223 | 2025-06-08T14:15:21.097000 | 2025-06-09T19:04:55.580000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 009cfbb22bb6ec126ec2addd9035730fe8c890b2574e276affce27f2bb0246a5 |
CVE-2025-32455 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the run_cmd argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:... | 8ee00f2136f955d2beea6ce908a7b038c81d54c9f17b3de819b714219313e8df | 2025-06-08T21:15:30.993000 | 2025-06-09T19:15:24.180000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | eee4c7ff37fcf59d7ea3836d6bd096488720670d8967c3d4b8208c6158b5eab2 |
CVE-2025-32456 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the put_file_to_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/... | 459564b95b5802f13a896998bb7650ddb997d1c880882d301d6cf0737da09290 | 2025-06-08T21:15:31.267000 | 2025-06-09T19:15:24.287000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | fb5c647cba515086154f7a5d3b544df7b3e28cf193688029c12b831e14272a40 |
CVE-2025-32457 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_file_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:... | 87fc5ca4595d36e2e80ecef080c97755763b2d4f11e838f6b60f23aa18b4448e | 2025-06-08T21:15:31.403000 | 2025-06-09T19:15:24.393000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 5067bafae8fbc6c4a3881c37b1e0761bba7655648326308683cb6fb8db4e78b1 |
CVE-2025-32458 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the get_syslog_from_qtn argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/A... | a9e58604c3543badb7417345f7c8edab62b5302b7fedfeac4b4b65e6f6c13422 | 2025-06-08T21:15:31.537000 | 2025-06-09T19:15:24.497000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | a2ac5bd914a1d52ca7d9c27a22edd54ccf4aaa5c26675d9ba2d1fc5cce335702 |
CVE-2025-32459 | The Quantenna Wi-Fi chipset ships with a local control script, router_command.sh (in the sync_time argument), that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/P... | e2db39045362fec6da38ff68a56bd75f04f427fa96e46713a03a82f5ceca84e6 | 2025-06-08T21:15:31.673000 | 2025-06-09T19:15:24.597000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8e94939f08b0fd54f4d1eeddc37313d43bca75192c810da81dc337dae074ba18 |
CVE-2025-35004 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFIP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is ... | c732e51a4598a60dc86d39be911a43d6d38d36b98bffd53cd2f3a99f23eb257e | 2025-06-08T21:15:31.807000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | fb45eb716ed1eefef129354c004767b26dc0884615d51ef541126d9d5f26410f |
CVE-2025-35005 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFMAC command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is... | 9a4b60dc4c2f90b5830e00c3c4c4991384ca98dafb6bd86424a394ceb7778583 | 2025-06-08T21:15:31.947000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 7b11cc9ddb98d5372eec4189df32ad44e0ea66360ad59070c2a6f98acab3287e |
CVE-2025-35006 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFPORTFWD command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," an... | adc706d7a1c2ca2a5a00ed029401736081db69d8082eb934d4ba2431bd77750c | 2025-06-08T21:15:32.087000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 0a8d055be34edd92345346aef8a441e9adc597465047017e619b44ed93c3973f |
CVE-2025-35007 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MFRULE command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and i... | 2694a4ac3f5009aac01155fefddad1d4c607b625472de157b19f09e65a4306b0 | 2025-06-08T21:15:32.227000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | c4703612eb0865dce20140fc17c68de9553b14285b0bdc32acd1c1ea5eeb81cc |
CVE-2025-35008 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MMNAME command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and i... | 30a0edcf7b06d73d1b028fd8ae4616091c168fd96ee18cbf343af28113f22739 | 2025-06-08T21:15:32.363000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 03f55a62ccbce63f6304e96377bbe0b4d4ce63adaa7bbcd3b912743c26d6d63e |
CVE-2025-35009 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNNETSP command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and ... | 38d6b5c6f0e80dddbbef2d579f3f4a2ec2cf3830809628744e271d81ce5a4422 | 2025-06-08T21:15:32.500000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 92b101087eb95e079d9507da3e89791b7cf33d7c9a1dcb9d62d5e7e517ff58c9 |
CVE-2025-35010 | Products that incorporate the Microhard BulletLTE-NA2 and IPn4Gii-NA2 are vulnerable to a post-authentication command injection issue in the AT+MNPINGTM command that can lead to privilege escalation. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and... | 8850ebf6ba19ed39250559d69a3cc1305b11b370b73b4ae82a84069ea2e306d1 | 2025-06-08T21:15:32.633000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | f993d2561430c32595fac2cdc3c89453ea3c4b0a0dbade15c71c8127e8a0448d |
CVE-2025-3459 | The Quantenna Wi-Fi chipset ships with a local control script, transmit_file, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This ... | 69b5a3bcea85b882fe0951cd7e0dc6f5745779e8b51c1b4269f1cf460e3f7700 | 2025-06-08T21:15:32.770000 | 2025-06-09T19:15:24.707000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 117faef3a2dbc3a7e502886ef4271bcc3a5a2030ee4743f9ff59293d5b3dd732 |
CVE-2025-3460 | The Quantenna Wi-Fi chipset ships with a local control script, set_tx_pow, that is vulnerable to command injection. This is an instance of CWE-88, "Improper Neutralization of Argument Delimiters in a Command ('Argument Injection')," and is estimated as a CVSS 7.7 (CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This iss... | 330e31d4357e604f6ea0453ae737787ab99ba36442341798b6ecf84bd170a7d2 | 2025-06-08T21:15:32.900000 | 2025-06-09T19:15:24.810000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | dd2ccc6fd977783e227ebdbfd4ffa25436ff51c6fcf42cf9113fe497a667840c |
CVE-2025-3461 | The Quantenna Wi-Fi chips ship with an unauthenticated telnet interface by default. This is an instance of CWE-306, "Missing Authentication for Critical Function," and is estimated as a CVSS 9.1 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N).
This issue affects Quantenna Wi-Fi chipset through version 8.0.0.28 of the la... | e53ac45a5423f609badbf350c554aedfd81a20b89663db26a72baa1d5f8d889b | 2025-06-08T21:15:33.030000 | 2025-06-09T19:15:24.923000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | dca0040c5379e49adb8a2afbd654c4ab47129557ce0e50dc2836cb4860f17bb7 |
CVE-2025-5848 | A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remo... | 9dcbfa368d12e339deea0aa0b93ca886aa718067d674412a6f5bf5219249b7a3 | 2025-06-08T22:15:21.200000 | 2025-06-09T19:04:50.113000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 79b552f6fb7d106e94b629961171eef9579036459c11cf78bc05582909becf75 |
CVE-2025-5849 | A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to ... | 81611529d2fcad46d21608ec34d7049666e150b881c13337c52d3d15ac08e00e | 2025-06-08T23:15:20.713000 | 2025-06-09T19:04:44.777000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 3fc99547345d40765d709c3754fb592b42a681e1202b341b74f1a94c359d5748 |
CVE-2025-5850 | A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remote... | e4e1ea29d1fd4317bd1311aad6bc3cacad0f0fa7cc243752d128e06843f96d9e | 2025-06-08T23:15:20.927000 | 2025-06-09T19:04:38.610000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 60ea1eca134d2c507572b8a852f7498501e9ef8a235b17f4584c66ef0eee5644 |
CVE-2025-5851 | A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been rated as critical. This issue affects the function fromadvsetlanip of the file /goform/AdvSetLanip of the component HTTP POST Request Handler. The manipulation of the argument lanMask leads to buffer overflow. The attack may be initiated remotely. T... | e731166befb4c0161dabcf536ceb6cf3491d054eb2162bb5e7c0dd3736dbb733 | 2025-06-09T00:15:20.837000 | 2025-06-09T19:04:27.920000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 4cbdd47e39ccd714f6004c3635825785ede30a01fc24d5c6c3d6b01a021639f3 |
CVE-2025-5852 | A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and... | 30735d9956ce1e7da2d366061dfa2786ee354b662140aa78ace68aad225f82d4 | 2025-06-09T01:15:20.633000 | 2025-06-09T19:04:20.593000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8df681d7adfaf143d36887054dd952c5d1535ded056478022b7bfc74ebdd9007 |
CVE-2025-5853 | A vulnerability classified as critical was found in Tenda AC6 15.03.05.16. Affected by this vulnerability is the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg. The manipulation of the argument remoteIp leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been di... | 5367aa29535993f7a71658f29fbe739bd6d905609b05d8079b99aaa798fc6cc3 | 2025-06-09T01:15:21.583000 | 2025-06-09T19:04:03.967000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 0039551dac59c0eed3c83167fb00615a01c0fd4becc841c6660167781dc35613 |
CVE-2025-5854 | A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to th... | 27e5924d48fd801d1e0c1ffac9857ddfa9b44531db8907f7e00bba16f1010900 | 2025-06-09T01:15:21.777000 | 2025-06-09T19:03:46.770000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 4e7653c75863665fc5c2f91ec8a052d5c2ee2403e6f3ed5083ac1c9af5bc8d9a |
CVE-2025-5855 | A vulnerability, which was classified as critical, was found in Tenda AC6 15.03.05.16. This affects the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been d... | eb7eccccd549d5567d8d044d6806490a4915dbe2f1b9d9528db098b8f1a6e66f | 2025-06-09T02:15:23.293000 | 2025-06-09T19:03:39.630000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 5555a027f5ae0401732a54dc16c757f8537dae2fa8e7d57fe49a80ccfe0ccb50 |
CVE-2025-5856 | A vulnerability has been found in PHPGurukul BP Monitoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /registration.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the... | 80c437405d1632cc8b655f928fbe7fa25b30e622b4fe1ac88f1395fead14a09f | 2025-06-09T03:15:25.353000 | 2025-06-10T14:56:12.723000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | a39036a4cffdf02b1ce88012ff9f0f4d928c1539f0089310b74d5cbe6feeb461 |
CVE-2025-5857 | A vulnerability was found in code-projects Patient Record Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /urinalysis_record.php. The manipulation of the argument itr_no leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed ... | 3489806c0e769fc3f12152007b98e83ddf93b3aa26ad5dcc29f7caee4bf613a4 | 2025-06-09T03:15:26 | 2025-06-12T16:19:16.927000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | d9b86212fb3ad3f32850e32ba60d46e6de58e29817b1e77763a41d51b3333952 |
CVE-2025-5858 | A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /patient-report.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been d... | f789b8a6279b30cd22f0bda6edf57666474d971e9c9e7adc228773e38c5603d1 | 2025-06-09T03:15:26.190000 | 2025-06-10T14:55:58.620000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 6ba1f2fa8a2ba3136f377114c4cd2df5a08720c1e1491839d304b92ab3874f1f |
CVE-2025-5859 | A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /test-details.php. The manipulation of the argument assignto leads to sql injection. The attack can be launched remotely. The exploi... | 51490053cba63a9427a60b0883dfe05c7cfda0bef593246b06906fabc8a75fc5 | 2025-06-09T04:15:45.350000 | 2025-06-09T19:03:29.737000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | cd84a592469f3f5733c7a27fd50c5f73302fb64e2ed4444832eafd08247e39c6 |
CVE-2025-5860 | A vulnerability, which was classified as critical, was found in PHPGurukul Maid Hiring Management System 1.0. This affects an unknown part of the file /admin/search-booking-request.php. The manipulation of the argument searchdata leads to sql injection. It is possible to initiate the attack remotely. The exploit has be... | 1dcc1fb676ff393976ad62aeab1d349c1b72870a98b5c6b7c0379df3734858f7 | 2025-06-09T04:15:48.427000 | 2025-06-09T19:03:16.047000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e96df6d322940c899e5f59679ab8db0e98b91471d8cdc67f199c03b35ba00641 |
CVE-2025-5861 | A vulnerability has been found in Tenda AC7 15.03.06.44 and classified as critical. This vulnerability affects the function fromadvsetlanip of the file /goform/AdvSetLanip. The manipulation of the argument lanMask leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the publ... | 5058f95c33956c3f1e6687917d4796a9da58d1e42b690e332968ee55034fc901 | 2025-06-09T05:15:20.297000 | 2025-06-09T19:03:01.067000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 9a116601570b8686e1853ac0c7c6ad0ecc5d017192935e18aa4c2fa2f09def71 |
CVE-2025-5862 | A vulnerability was found in Tenda AC7 15.03.06.44 and classified as critical. This issue affects the function formSetPPTPUserList of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and m... | 294f16a90aec41605dc6b15133b27d23000aba4110ab128bfda7127ea7515c2b | 2025-06-09T05:15:21.887000 | 2025-06-09T19:02:54.097000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 7a39dc355793f45134c8b48790d53630878c90c401239d50436a5cef43565b07 |
CVE-2025-25207 | The Authorino service in the Red Hat Connectivity Link is the authorization service for zero trust API security. Authorino allows the users with developer persona to add callbacks to be executed to HTTP endpoints once the authorization process is completed. It was found that an attacker with developer persona access ca... | aadf88e4fa1369fbcdde9d9dde58a2e7a1f23bf6983fde05ab453526a0c96dae | 2025-06-09T06:15:24.413000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8d8480e27a1deda78aea554cb6653651613bf40c2e361c8bbdc83b5d66ad1044 |
CVE-2025-25208 | A Developer persona can bring down the Authorino service, preventing the evaluation of all AuthPolicies on the cluster | ed48c800ac948d31f86b0496a5f212b94f837e0ae2ecc827826536ff680f90a6 | 2025-06-09T06:15:24.667000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | b9e41d19b86576dcf2ae367b2af534a66df2b7ab43182b6a73037ed8edeaf976 |
CVE-2025-25209 | The AuthPolicy metadata on Red Hat Connectivity Link contains an object which stores secretes, however it assumes those secretes are already in the kuadrant-system instead of copying it to the referred namespace. This creates space for a malicious actor with a developer persona access to leak those secrets over HTTP co... | 502f058b1e5c462cb409939f60b376bd53bc2a2e2be3f55b3f6f2dd90364cfce | 2025-06-09T06:15:24.853000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 7fe9fb4792287bb9c1cd9bcbd10b40beb5a7706b92e274b8dbc238c4ba6d8d2f |
CVE-2025-3581 | The Newsletter WordPress plugin before 8.8.5 does not validate and escape some of its Widget options before outputting them back in a page/post where the block is embed, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disal... | 5c04227333f09225293beb993a9fd29b26ad90ff0d55ceeff51388ec39c6b6b6 | 2025-06-09T06:15:25.067000 | 2025-06-12T16:16:47.417000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | ea1b4df0d70b364c73f16f0e3acb5ca4a1efbad5d3ea23215097275e7adfa1c3 |
CVE-2025-3582 | The Newsletter WordPress plugin before 8.85 does not sanitise and escape some of its Form settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup). | a830b544df270af98b32d7f3b79e7ec30dd5d1381bd620ed511a3ac426f976b4 | 2025-06-09T06:15:25.200000 | 2025-06-12T16:22:44.097000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 3847b4fd4b0aa534f7538dcf59ed0e2a0a9878627458ef18b35bcafd4e89a30b |
CVE-2025-47711 | There's a flaw in the nbdkit server when handling responses from its plugins regarding the status of data blocks. If a client makes a specific request for a very large data range, and a plugin responds with an even larger single block, the nbdkit server can encounter a critical internal error, leading to a denial-of-se... | 5fa5ae24fd9de693b6aed3222bf88748ed25d06424128213b5286cfe081d867a | 2025-06-09T06:15:25.320000 | 2025-08-26T16:26:35.767000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 50653a1ad8552ffd9b654c4d547f11d71f1d3c551308bfb642c160e2add85174 |
CVE-2025-47712 | A flaw exists in the nbdkit "blocksize" filter that can be triggered by a specific type of client request. When a client requests block status information for a very large data range, exceeding a certain limit, it causes an internal error in the nbdkit, leading to a denial of service. | b59844efea29666867f896de46b4139c64a026dcf3fd8460435330b7eb1ea684 | 2025-06-09T06:15:25.537000 | 2025-08-21T01:19:08.157000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | f731431f618e4dfd5968d92abe6a8eddd78d1d2e4de5275b5eadfba88469093b |
CVE-2025-4652 | The Broadstreet WordPress plugin before 1.51.8 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin. | b6857a40da1ff07113fa592718b1c50aa81e89ee77d277b722670707e9c8920a | 2025-06-09T06:15:25.740000 | 2025-06-12T16:15:48.467000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 880e1a71c71c35f51ef3cc6ced83d1abdb49fc9f4a212759d79d45c1bc09a628 |
CVE-2025-5863 | A vulnerability was found in Tenda AC5 15.03.06.47. It has been classified as critical. Affected is the function formSetRebootTimer of the file /goform/SetRebootTimer. The manipulation of the argument rebootTime leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been dis... | 25bcee283e8420c89afd3c0f79aafa6b73f51c67f0963f90d16f075053e2fda3 | 2025-06-09T06:15:25.870000 | 2025-06-09T19:02:45.383000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 1a151cfa9424553b8acfa3d9309e4f8c32f7b5d2e9685ca71eb0aa71e9931341 |
CVE-2025-5864 | A vulnerability was found in Tenda TDSEE App up to 1.7.12. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /app/ConfirmSmsCode of the component Password Reset Confirmation Code Handler. The manipulation leads to improper restriction of excessive authentication... | 9c4fe3aee147b7a43cf1477e665d51c48eba2a9b3ddaabcecd1e9231fcd75557 | 2025-06-09T06:15:26.170000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | d28cd454bc2a7e69ddd8e82e883ef786dcd3f893b08ab18e3801060b3a9d27a1 |
CVE-2025-5865 | A vulnerability was found in RT-Thread 5.1.0. It has been rated as critical. Affected by this issue is the function sys_select of the file rt-thread/components/lwp/lwp_syscall.c of the component Parameter Handler. The manipulation of the argument timeout leads to memory corruption. The vendor explains, that "[t]he time... | 7037245ab0c37d1cdc0a0e143e43b740868b6072ce8971f7382a6abafe9630bc | 2025-06-09T07:15:22.660000 | 2025-07-11T18:22:27.577000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | b7f90b4108354f29e5d490478f5c37a935225d4b388acd7c2018cc7d183231a3 |
CVE-2025-5866 | A vulnerability classified as critical has been found in RT-Thread 5.1.0. This affects the function sys_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index. | f6341b5fd1c335bd2f4da12b5faabcaf28d752183ba8dc53802c0690eae575a9 | 2025-06-09T07:15:22.947000 | 2025-07-11T18:19:58.213000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8cc1c1006c249551f887297f8fe52634588d89a22a633ef377694c8db996c4f2 |
CVE-2025-5893 | Smart Parking Management System from Honding Technology has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to access a specific page and obtain plaintext administrator credentials. | 104c5b5c9e2ead6e24555efc3200d1304d9e44ce4968071c3b5c0d75ed9485a0 | 2025-06-09T07:15:23.167000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | bc896cd3ce659583053cc515416f2bfed2eacb11887d1264785aa8ef5d98aa18 |
CVE-2025-5867 | A vulnerability classified as critical was found in RT-Thread 5.1.0. This vulnerability affects the function csys_sendto of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument to leads to null pointer dereference. | f777c87cef750ace507f6d29cbda048dfff431eadb0e98557dcc8b82ba90a0a6 | 2025-06-09T08:15:22.140000 | 2025-07-11T18:13:44.623000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 9235a34ea0a61cd64ea9541309dbf78e535853d60335cd47fa42a405d8cce506 |
CVE-2025-5868 | A vulnerability, which was classified as critical, has been found in RT-Thread 5.1.0. This issue affects the function sys_thread_sigprocmask of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument how leads to improper validation of array index. | 41df7616d936024ab773d49abd9ff098276f53fdeb87853ddd928f7bd1202ff8 | 2025-06-09T08:15:22.370000 | 2025-07-11T18:11:46.943000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 5a98479099983ec338ec564e4d9d1c1dd4f1109d9bc51ade4b6569f663e43ee7 |
CVE-2025-5894 | Smart Parking Management System from Honding Technology has a Missing Authorization vulnerability, allowing remote attackers with regular privileges to access a specific functionality to create administrator accounts, and subsequently log into the system using those accounts. | b31c8a63ab0f43bb8a71f6c5e03b3ea5162761a8a42e8e3d0ea3e3ce03ee4dc8 | 2025-06-09T08:15:22.607000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 07a3614a3afceb31602d690f11601de7621cce48d29bf4dfb1650c346824c995 |
CVE-2025-5869 | A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption. | 3694dbb702bb2de29a201a479972d638dcad11fcc63163a7818124b5015c2e99 | 2025-06-09T09:15:22.320000 | 2025-07-11T18:07:03.757000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 8ad2cddc005620e3eead33b290386c41834f52232bfcda32a335cc6651bf7e7d |
CVE-2025-5870 | A vulnerability has been found in TRENDnet TV-IP121W 1.1.1 Build 36 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/setup.cgi of the component Web Interface. The manipulation leads to improper authentication. The attack can be launched remotely. The exploit has ... | 5e9ac5c5ed774f4f59b0d7c29e978954f5b2d4d6515ceb258e0536900307eddd | 2025-06-09T09:15:22.500000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 4732d5f09aa7df0f5683e65f8db373e347ea3d37ab3b55a907e18183f2b6de5f |
CVE-2025-40675 | A Reflected Cross-Site Scripting (XSS) vulnerability has been found in Bagisto v2.0.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the parameter 'query' in '/search'. This vulnerability can be exploited to steal sensitive user data... | 247e55f7725f704d80c3f3dc92db4bb4bc53909e6b3e0cc9add495f4e698e43e | 2025-06-09T10:15:25.190000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 5ece14a87e7f0c262f3514f4226e8d41e16d11437e17462c5b435bb45a3bfbe5 |
CVE-2025-5871 | A vulnerability was found in Papendorf SOL Connect Center 3.3.0.0 and classified as problematic. Affected by this issue is some unknown functionality of the component Web Interface. The manipulation leads to missing authentication. The attack may be launched remotely. The exploit has been disclosed to the public and ma... | f36aefd05814a5679382759db1b7620b89fc817710fe101b4ab1d590ba26098a | 2025-06-09T10:15:26.030000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 32f616625a17e4418abc267d10c84174d58160cef01102afeb3fa670b43188b8 |
CVE-2025-5872 | A vulnerability was found in eGauge EG3000 Energy Monitor 3.6.3. It has been classified as problematic. This affects an unknown part of the component Setting Handler. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be... | caa792558497800fff061a177198762bc7e212cf29fda2507118b4cddda8e2a6 | 2025-06-09T10:15:26.370000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 4b27c6a0d8ead35b204d98989f2f57b9db76ea0b36d00d07c493f0338c8d0e5b |
CVE-2025-27709 | Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the Service Account Auditing reports. | 132959b914eecf72dc520fda409d27bed3636b737f8f8f425d41b0571b406dad | 2025-06-09T11:15:20.807000 | 2025-06-16T15:14:52.007000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 99b9f0b4e08f2cbcc79e5a81e9a7c1f24b9ce6adf46ceead439ebabbc8bf89ef |
CVE-2025-36528 | Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in Service Account Auditing reports. | 161b33bddc441b8b31d366b9487c82c83138ecb8d63a9c1973d865caf85a5e96 | 2025-06-09T11:15:21.773000 | 2025-06-16T15:14:39.797000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | f477768dc97477eb8112afb9d1f21090d61322bd6329e5d2a42d0c71090ae252 |
CVE-2025-3835 | Zohocorp ManageEngine Exchange Reporter Plus versions 5721 and prior are vulnerable to Remote code execution in the Content Search module. | f00c20f279cfaa39ffd52d1ee6a1aa8cc09a7a720632a6c411f94673d889e735 | 2025-06-09T11:15:21.913000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 4aa64af72177a259be616da1d0633a6d4e57b1f20aa099ad2afdff759cbc07cc |
CVE-2025-41437 | Zohocorp ManageEngine OpManager, NetFlow Analyzer, Network Configuration Manager, Firewall Analyzer and OpUtils versions 128565 and below are vulnerable to Reflected XSS on the login page. | e1f36effadcce76789d241ee46d626b82076da8ddb25bbb7b55f6d4d177ed12c | 2025-06-09T11:15:22.053000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | d8dbe1f348e88cebd0a8892ab19c84bc1f77848e0949d70847277937c02e5a40 |
CVE-2025-5873 | A vulnerability was found in eCharge Hardy Barth Salia PLCC 2.2.0. It has been declared as critical. This vulnerability affects unknown code of the file /firmware.php of the component Web UI. The manipulation of the argument media leads to unrestricted upload. The attack can be initiated remotely. The exploit has been ... | 75b2b77f0840c520f2ed77f324b138ab09742e202c833948713bf5b7dad7dd81 | 2025-06-09T11:15:22.240000 | 2025-06-09T12:15:47.880000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e6536ef35f8aab89c00c3f5751257dbc10ef8e3beede88b12f5901c9f7eee6db |
CVE-2025-5874 | A vulnerability was found in Redash up to 10.1.0/25.1.0. It has been rated as problematic. This issue affects the function run_query of the file /query_runner/python.py of the component getattr Handler. The manipulation leads to sandbox issue. The complexity of an attack is rather high. The exploitation is known to be ... | ea54853c2b7bc5ff46d6608fe814ec63ce7e4e51f16282507cc935679407eb5e | 2025-06-09T11:15:22.440000 | 2025-07-16T15:15:33.237000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 2ed76343bdce12af69582208a850482c4cee2fa853204ed33425528881a76589 |
CVE-2025-41444 | Zohocorp ManageEngine ADAudit Plus versions 8510 and prior are vulnerable to authenticated SQL injection in the alerts module. | 4aab5ad9882f62b921077af9d66c855155f9670945ef24dc189eccc280efd248 | 2025-06-09T12:15:21.240000 | 2025-06-16T15:14:06.487000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | c6cc2d3b54da3c26390ab95f5d5e8b313d7747ea04d62d4b28048077395ca238 |
CVE-2025-5875 | A vulnerability classified as critical has been found in TP-LINK Technologies TL-IPC544EP-W4 1.0.9 Build 240428 Rel 69493n. Affected is the function sub_69064 of the file /bin/main. The manipulation of the argument text leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclos... | 62f1d650bdc7d320fdafbd032ecdc22df3a7a8421628891085938a99877c7d1c | 2025-06-09T12:15:21.890000 | 2025-06-23T14:21:01.890000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 9379047373926c85000200c52cb5975fb973fe3bae6429fb4994e946f6256553 |
CVE-2025-5876 | A vulnerability classified as problematic was found in Lucky LM-520-SC, LM-520-FSC and LM-520-FSC-SAM up to 20250321. Affected by this vulnerability is an unknown functionality. The manipulation leads to missing authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be... | 874b54efeb4570f745eafc122d1af03efbfe4a7ad1fcb3e3052fd896a872d909 | 2025-06-09T12:15:22.107000 | 2025-06-09T13:15:25.777000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | be72f79b40eafb1d14bc547e106b07107223e1a088d5c5c9a5a43805d1d25b32 |
CVE-2025-40668 | Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an attacker, with low privilege level, to change the password of other users through a POST request using the parameters idUser, PasswordActual, PasswordNew and PasswordNewRepeat in /PC/WebService.aspx/validateChangePassword%C3%B1a. To ... | c7113aafe8ececa0f563077041b2029d57e62265377533078bc1079d5bb0d3b3 | 2025-06-09T13:15:22.633000 | 2025-06-12T16:06:47.857000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e2ab1550e8eba6657812f669a75c5d47ab7b6dbd2cf439e999b88a4f2525b040 |
CVE-2025-40669 | Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to modify the permissions held by each of the application's users, including the user himself by sending a POST request to /PC/Options.aspx?Command=2&Page=-1. | e537605d5087ceea7adb9eb62176180bfc5b5f2e7471de0013ac4df7ebd0226c | 2025-06-09T13:15:22.803000 | 2025-06-12T16:06:47.857000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | ac8e172b9cbaab1b839566cffcc874470fb25a2938ee461e13671db9ecef36a3 |
CVE-2025-40670 | Incorrect authorization vulnerability in TCMAN's GIM v11. This vulnerability allows an unprivileged attacker to create a user and assign it many privileges by sending a POST request to /PC/frmGestionUser.aspx/updateUser. | 5d72324e880d612c7d5d4c20e33a7ae272b80060f64388f2f6dbbaf27285bf83 | 2025-06-09T13:15:22.963000 | 2025-06-12T16:06:47.857000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | e88b949bcd8fc2f74453c9ac6fbecb02eab3b82e30fae53b58e5d278df01fbe5 |
CVE-2025-48053 | Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, sending a malicious URL in a PM to a bot user can cause a reduced the availability of a Discourse instance. This issue is pa... | 3be49e34c481b89cc9161abf81b1452612d9eb2a48b2b1014811f08edbd9f71c | 2025-06-09T13:15:23.163000 | 2025-08-25T15:15:11.667000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 73433b3302af1de89c3e1e086f9fe19a87b276de0d296f6e5b880bc938b0e201 |
CVE-2025-48062 | Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, certain invites via email may result in HTML injection in the email body if the topic title includes HTML. This includes inv... | f27756a395c498b73a157f30d8d9c8ad57bd450582b0267e179f5012982ef6a1 | 2025-06-09T13:15:23.320000 | 2025-08-25T15:07:27.160000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 328e60dc4be5127569c7da9cae276f618c3415016ef6d43b14157bb8eea67484 |
CVE-2025-48877 | Discourse is an open-source discussion platform. Prior to version 3.4.4 of the `stable` branch, version 3.5.0.beta5 of the `beta` branch, and version 3.5.0.beta6-dev of the `tests-passed` branch, Codepen is present in the default `allowed_iframes` site setting, and it can potentially auto-run arbitrary JS in the iframe... | 309c65865af42c19b9624a86be4a464f7c6abd15d60eda4eb14f213eb946b110 | 2025-06-09T13:15:23.500000 | 2025-08-25T15:14:34.210000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 6c492345f779864b6ec3df0ac728cba0d3c93770564b649e07a30dd42e1681e8 |
CVE-2025-49006 | Wasp (Web Application Specification) is a Rails-like framework for React, Node.js, and Prisma. Prior to version 0.16.6, Wasp authentication has a vulnerability in the OAuth authentication implementation (affecting only Keycloak with a specific config). Wasp currently lowercases OAuth user IDs before storing / fetching ... | a56a38b2138df6b7a0d4626884a64b578b8a9bffb0f90754b64f30193bc4cad3 | 2025-06-09T13:15:23.650000 | 2025-06-12T16:06:47.857000 | false | nvd | https://services.nvd.nist.gov/rest/json/cves/2.0?pubStartDate=2025-06-07T02:12:27.000Z&pubEndDate=2025-09-05T02:12:27.000Z&resultsPerPage=2000&startIndex=0 | 2025-09-05T02:12:28.651000 | 369e8620940e586baccf3515b8e74017c34f1543552098c1c3b28a9373a968e9 |
CVE-KEV Snapshot (one-time, offline bundle)
This bundle lets you rank likely exploited CVEs and cite official sources without any APIs or accounts, fully offline. It’s a one-time snapshot of the last 90 days of NVD, aligned with CISA KEV for immediate focus on likely exploited CVEs. Query-ready Parquet tables and an optional small RAG pack let you rank by severity, pivot by CWE, and fetch references for briefings. Every row includes provenance; validation metrics and an integrity manifest are included. The compiled dataset is dedicated to the public domain (CC0).
Quick start (60 seconds)
- Open
demo/OVX_quickstart.html(no network) or demo/OVX_quickstart.ipynb. - Or run this DuckDB query for top KEV CVEs by severity:
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
Snapshot
- Snapshot as of (UTC): 2025-09-05T02:12:27Z
- NVD window (days): 90
Accuracy at a glance
- Total CVE rows: 11,344
- Total KEV rows: 27
- Artifacts: Validation Report · Integrity Check · Build Manifest
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See
docs/VALIDATION.jsonforkev_rows_total_fetched,kev_rows_within_window,kev_rows_filtered_out, andkev_within_window_over_global_ratio.
- KEV is window‑aligned; within‑window coverage = 1.0 by design. See
Contents
parquet/:cve.parquet,nvd_meta.parquet,kev.parquet,edges.parquet,preview.parquet(~1000 CVEs; see preview criteria)rag/(optional):index.faiss,meta.parquet,mapping.parquet,vectors.npydocs/:LICENSES.md,LICENCE.md(CC0 legal code),NOTICE.md,INTEGRITY.txt,VALIDATION.json,BUILD_MANIFEST.jsondemo/:OVX_quickstart.ipynb,OVX_quickstart.html
RAG note
Optional RAG pack built from PD/CC0 text using BAAI/bge-small-en-v1.5 (384‑dim), normalized vectors with inner product (cosine) similarity. Retrieval is offline-only; query embedding requires the model to be already cached locally.
Preview parquet
- parquet/preview.parquet is a convenience subset for quick inspection.
- Selection: first 1000 rows by
cve_idordering fromparquet/cve.parquet. - Columns:
cve_id,summary,published_date,modified_date(when available); falls back to a best‑effort subset if needed.
Validation, integrity, build metadata
docs/VALIDATION.jsonincludes: counts,cvss_v3_presence_ratio,cwe_presence_ratio,kev_cve_coverage_ratio,kev_cve_coverage_ratio_within_window,kev_rows_total_fetched,kev_rows_within_window,kev_within_window_over_global_ratio,rejected_cve_count,url_shape_failures,http_head_failures_hard,http_head_failures_flaky,dead_reference_links,duplicate_edges_dropped,snapshot_as_of.- URL checks (if present) were executed conservatively with a single worker.
- Verify integrity locally:
- macOS:
shasum -a 256 -c docs/INTEGRITY.txt - Linux:
sha256sum -c docs/INTEGRITY.txt
- macOS:
- Build metadata (transparency): see
docs/BUILD_MANIFEST.jsonfor snapshot parameters (timestamp, NVD window, tool/version info, internal commit/config). Provided for transparency; the build system is not included.
Storage and performance
- Parquet compression:
snappy. - Disk footprint varies by window size; see file sizes before downloading.
Limitations
- Some CVEs may lack CVSS vectors/scores within the window (nulls are expected).
- URL checks are conservative and may still include dead/redirected links; verify with official sources.
- KEV rows are filtered to the NVD window; counts reflect in‑window coverage, not global totals.
Usage
- DuckDB
SELECT c.cve_id, m.cvss_v3_score, k.date_added
FROM read_parquet('parquet/kev.parquet') k
JOIN read_parquet('parquet/cve.parquet') c USING (cve_id)
LEFT JOIN read_parquet('parquet/nvd_meta.parquet') m USING (cve_id)
ORDER BY (m.cvss_v3_score IS NULL) ASC, m.cvss_v3_score DESC, k.date_added DESC
LIMIT 20;
- Python (Pandas)
import pandas as pd
k = pd.read_parquet('parquet/kev.parquet')
c = pd.read_parquet('parquet/cve.parquet')
m = pd.read_parquet('parquet/nvd_meta.parquet')
df = k.merge(c, on='cve_id').merge(m[['cve_id','cvss_v3_score']], on='cve_id', how='left')
print(df.head())
- Python (Polars)
import polars as pl
k = pl.read_parquet('parquet/kev.parquet')
c = pl.read_parquet('parquet/cve.parquet')
m = pl.read_parquet('parquet/nvd_meta.parquet').select('cve_id','cvss_v3_score')
df = k.join(c, on='cve_id').join(m, on='cve_id', how='left')
print(df.head())
Non-affiliation and licensing
- Not affiliated with NIST/NVD, CISA/KEV, or FIRST/EPSS.
- NVD non-endorsement: "This product uses data from the NVD API but is not endorsed or certified by the NVD."
- Compiled artifact dedicated to the public domain under CC0 1.0 (see
docs/LICENCE.md). - Upstream sources: NVD (public domain), CISA KEV (CC0). Linked third‑party pages (vendor advisories, blogs, etc.) are governed by their own terms.
Citation
If you use this snapshot, please cite:
"CVE-KEV Snapshot (${snapshot_as_of})", CC0-1.0, https://huggingface.co/datasets/NostromoHub/cve-kev-snapshot-90d-2025-09-04
- Downloads last month
- 34