mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-11 16:13:34 +00:00
Auto-Update: 2025-06-24T04:00:33.568536+00:00
This commit is contained in:
parent
f9e7766ff6
commit
03771bd513
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34031",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:23.340",
|
||||
"lastModified": "2025-06-24T01:15:23.340",
|
||||
"lastModified": "2025-06-24T03:15:32.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,7 +79,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-path-traversal",
|
||||
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34032",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.350",
|
||||
"lastModified": "2025-06-24T01:15:24.350",
|
||||
"lastModified": "2025-06-24T03:15:32.987",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-xss",
|
||||
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-plugin-xss",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34033",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.493",
|
||||
"lastModified": "2025-06-24T01:15:24.493",
|
||||
"lastModified": "2025-06-24T03:15:33.090",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -75,7 +75,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials",
|
||||
"url": "https://vulncheck.com/advisories/5vtechnologies-blue-angel-command-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34034",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.630",
|
||||
"lastModified": "2025-06-24T01:15:24.630",
|
||||
"lastModified": "2025-06-24T03:15:33.193",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -71,7 +71,7 @@
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials",
|
||||
"url": "https://vulncheck.com/advisories/5vtechnologies-blue-angel-hardcoded-credentials",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34035",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:24.763",
|
||||
"lastModified": "2025-06-24T01:15:24.763",
|
||||
"lastModified": "2025-06-24T03:15:33.293",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -83,7 +83,7 @@
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service-command-injection",
|
||||
"url": "https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-34037",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T01:15:25.037",
|
||||
"lastModified": "2025-06-24T01:15:25.037",
|
||||
"lastModified": "2025-06-24T03:15:33.400",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -79,7 +79,7 @@
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/linksys-multiple-routers-command-injection",
|
||||
"url": "https://vulncheck.com/advisories/linksys-routers-command-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34038.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34038.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34038",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T02:15:21.667",
|
||||
"lastModified": "2025-06-24T03:15:33.507",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability exists in Fanwei e-cology 8.0 via the getdata.jsp endpoint. The application directly passes unsanitized user input from the sql parameter into a database query within the getSelectAllIds(sql, type) method, reachable through the cmd=getSelectAllId workflow in the AjaxManager. This allows unauthenticated attackers to execute arbitrary SQL queries, potentially exposing sensitive data such as administrator password hashes."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 8.7,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/fanwei-ecology-sql-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnblogs.com/0day-li/p/14637680.html",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-33202",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.weaver.com.cn/",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
90
CVE-2025/CVE-2025-340xx/CVE-2025-34039.json
Normal file
90
CVE-2025/CVE-2025-340xx/CVE-2025-34039.json
Normal file
@ -0,0 +1,90 @@
|
||||
{
|
||||
"id": "CVE-2025-34039",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T02:15:22.540",
|
||||
"lastModified": "2025-06-24T02:15:22.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/yonyou-ufida-nc-beanshell-code-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnblogs.com/pursue-security/p/17685141.html",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-30167",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
94
CVE-2025/CVE-2025-340xx/CVE-2025-34040.json
Normal file
94
CVE-2025/CVE-2025-340xx/CVE-2025-34040.json
Normal file
@ -0,0 +1,94 @@
|
||||
{
|
||||
"id": "CVE-2025-34040",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T02:15:22.673",
|
||||
"lastModified": "2025-06-24T02:15:22.673",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-434"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://service.seeyon.com/patchtools/tp.html#/patchList?type=%E5%AE%89%E5%85%A8%E8%A1%A5%E4%B8%81&id=1",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/zhiyuan-oa-system-path-traversal-file-upload",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnblogs.com/pursue-security/p/17677130.html",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-01627",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-340xx/CVE-2025-34041.json
Normal file
86
CVE-2025/CVE-2025-340xx/CVE-2025-34041.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-34041",
|
||||
"sourceIdentifier": "disclosure@vulncheck.com",
|
||||
"published": "2025-06-24T02:15:22.820",
|
||||
"lastModified": "2025-06-24T02:15:22.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 10.0,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "HIGH",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "disclosure@vulncheck.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://vulncheck.com/advisories/sangfor-edr-command-injection",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sangfor.com/blog/cybersecurity/sangfor-endpoint-secure-remote-command-execution-vulnerability",
|
||||
"source": "disclosure@vulncheck.com"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48461.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48461.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48461",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:33.613",
|
||||
"lastModified": "2025-06-24T03:15:33.613",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.0,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48462.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48462.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48462",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:33.753",
|
||||
"lastModified": "2025-06-24T03:15:33.753",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining access to the product."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48463.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48463.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48463",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:33.870",
|
||||
"lastModified": "2025-06-24T03:15:33.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 3.1,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2025/CVE-2025-484xx/CVE-2025-48466.json
Normal file
48
CVE-2025/CVE-2025-484xx/CVE-2025-48466.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2025-48466",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.013",
|
||||
"lastModified": "2025-06-24T03:15:34.013",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/shipcod3/CVE-2025-48466",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
},
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48467.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48467.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48467",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.140",
|
||||
"lastModified": "2025-06-24T03:15:34.140",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an attacker to cause repeated reboots, potentially leading to remote denial-of-service and system unavailability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48468.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48468.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48468",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.267",
|
||||
"lastModified": "2025-06-24T03:15:34.267",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.5,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
48
CVE-2025/CVE-2025-484xx/CVE-2025-48469.json
Normal file
48
CVE-2025/CVE-2025-484xx/CVE-2025-48469.json
Normal file
@ -0,0 +1,48 @@
|
||||
{
|
||||
"id": "CVE-2025-48469",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.390",
|
||||
"lastModified": "2025-06-24T03:15:34.390",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 9.6,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://jro.sg/CVEs/CVE-2025-48469/",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
},
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
44
CVE-2025/CVE-2025-484xx/CVE-2025-48470.json
Normal file
44
CVE-2025/CVE-2025-484xx/CVE-2025-48470.json
Normal file
@ -0,0 +1,44 @@
|
||||
{
|
||||
"id": "CVE-2025-48470",
|
||||
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"published": "2025-06-24T03:15:34.523",
|
||||
"lastModified": "2025-06-24T03:15:34.523",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users\u2019 browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 4.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.7,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
|
||||
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-525xx/CVE-2025-52560.json
Normal file
60
CVE-2025/CVE-2025-525xx/CVE-2025-52560.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52560",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T03:15:34.653",
|
||||
"lastModified": "2025-06-24T03:15:34.653",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 8.1,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-640"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/commit/bca2bd7ab95e7990e358fd35a7daf51a9c16aa75",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-2ch5-gqjm-8p92",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-525xx/CVE-2025-52574.json
Normal file
60
CVE-2025/CVE-2025-525xx/CVE-2025-52574.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-52574",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-24T03:15:34.797",
|
||||
"lastModified": "2025-06-24T03:15:34.797",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SysmonElixir is a system monitor HTTP service in Elixir. Prior to version 1.0.1, the /read endpoint reads any file from the server's /etc/passwd by default. In v1.0.1, a whitelist was added that limits reading to only files under priv/data. This issue has been patched in version 1.0.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/bocaletto-luca/elixir-system-monitor/commit/647a5525f6667a28f1133985213dd080ea11bb87",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/bocaletto-luca/elixir-system-monitor/security/advisories/GHSA-9vj4-rv7q-36qj",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52971.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52971.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52971",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:34.947",
|
||||
"lastModified": "2025-06-24T03:15:34.947",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52972.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52972.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52972",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.027",
|
||||
"lastModified": "2025-06-24T03:15:35.027",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52973.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52973.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52973",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.090",
|
||||
"lastModified": "2025-06-24T03:15:35.090",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52974.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52974.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52974",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.147",
|
||||
"lastModified": "2025-06-24T03:15:35.147",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52975.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52975.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52975",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.210",
|
||||
"lastModified": "2025-06-24T03:15:35.210",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52976.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52976.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52976",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.270",
|
||||
"lastModified": "2025-06-24T03:15:35.270",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52977.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52977.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52977",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.333",
|
||||
"lastModified": "2025-06-24T03:15:35.333",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52978.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52978.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52978",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.393",
|
||||
"lastModified": "2025-06-24T03:15:35.393",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
16
CVE-2025/CVE-2025-529xx/CVE-2025-52979.json
Normal file
16
CVE-2025/CVE-2025-529xx/CVE-2025-52979.json
Normal file
@ -0,0 +1,16 @@
|
||||
{
|
||||
"id": "CVE-2025-52979",
|
||||
"sourceIdentifier": "psirt@fortinet.com",
|
||||
"published": "2025-06-24T03:15:35.453",
|
||||
"lastModified": "2025-06-24T03:15:35.453",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Rejected reason: Not used"
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
141
CVE-2025/CVE-2025-65xx/CVE-2025-6536.json
Normal file
141
CVE-2025/CVE-2025-65xx/CVE-2025-6536.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6536",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T02:15:22.967",
|
||||
"lastModified": "2025-06-24T02:15:22.967",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in Tarantool up to 3.3.1 and classified as problematic. Affected by this vulnerability is the function tm_to_datetime in the library src/lib/core/datetime.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-617"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/tarantool/tarantool/issues/11347",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/19613858/tarantool_crash.txt",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313663",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313663",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597454",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6551.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6551.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6551",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T02:15:23.170",
|
||||
"lastModified": "2025-06-24T02:15:23.170",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in java-aodeng Hope-Boot 1.0.0 and classified as problematic. This issue affects the function Login of the file /src/main/java/com/hope/controller/WebController.java. The manipulation of the argument errorMsg leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md#steps-to-reproduce",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313691",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313691",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596615",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
141
CVE-2025/CVE-2025-65xx/CVE-2025-6552.json
Normal file
141
CVE-2025/CVE-2025-65xx/CVE-2025-6552.json
Normal file
@ -0,0 +1,141 @@
|
||||
{
|
||||
"id": "CVE-2025-6552",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-24T03:15:35.520",
|
||||
"lastModified": "2025-06-24T03:15:35.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in java-aodeng Hope-Boot 1.0.0. It has been classified as problematic. Affected is the function doLogin of the file /src/main/java/com/hope/controller/WebController.java of the component Login. The manipulation of the argument redirect_url leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||||
"baseScore": 5.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-601"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md#steps-to-reproduce",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313692",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313692",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596681",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
111
CVE-2025/CVE-2025-65xx/CVE-2025-6559.json
Normal file
111
CVE-2025/CVE-2025-65xx/CVE-2025-6559.json
Normal file
@ -0,0 +1,111 @@
|
||||
{
|
||||
"id": "CVE-2025-6559",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-06-24T03:15:35.700",
|
||||
"lastModified": "2025-06-24T03:15:35.700",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.\u00a0The affected models are out of support; replacing the device is recommended."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-10195-69da1-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
111
CVE-2025/CVE-2025-65xx/CVE-2025-6560.json
Normal file
111
CVE-2025/CVE-2025-65xx/CVE-2025-6560.json
Normal file
@ -0,0 +1,111 @@
|
||||
{
|
||||
"id": "CVE-2025-6560",
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"published": "2025-06-24T03:15:35.897",
|
||||
"lastModified": "2025-06-24T03:15:35.897",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "twcert@cert.org.tw",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.\u00a0\n\nThe affected models are out of support; replacing the device is recommended."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "twcert@cert.org.tw",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/en/cp-139-10198-55217-2.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
},
|
||||
{
|
||||
"url": "https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html",
|
||||
"source": "twcert@cert.org.tw"
|
||||
}
|
||||
]
|
||||
}
|
78
README.md
78
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-24T02:00:19.482773+00:00
|
||||
2025-06-24T04:00:33.568536+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-24T01:35:34.217000+00:00
|
||||
2025-06-24T03:15:35.897000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,56 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299140
|
||||
299168
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `12`
|
||||
Recently added CVEs: `28`
|
||||
|
||||
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-24T01:15:23.340`)
|
||||
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-24T01:15:24.350`)
|
||||
- [CVE-2025-34033](CVE-2025/CVE-2025-340xx/CVE-2025-34033.json) (`2025-06-24T01:15:24.493`)
|
||||
- [CVE-2025-34034](CVE-2025/CVE-2025-340xx/CVE-2025-34034.json) (`2025-06-24T01:15:24.630`)
|
||||
- [CVE-2025-34035](CVE-2025/CVE-2025-340xx/CVE-2025-34035.json) (`2025-06-24T01:15:24.763`)
|
||||
- [CVE-2025-34036](CVE-2025/CVE-2025-340xx/CVE-2025-34036.json) (`2025-06-24T01:15:24.903`)
|
||||
- [CVE-2025-34037](CVE-2025/CVE-2025-340xx/CVE-2025-34037.json) (`2025-06-24T01:15:25.037`)
|
||||
- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-24T00:15:25.917`)
|
||||
- [CVE-2025-6532](CVE-2025/CVE-2025-65xx/CVE-2025-6532.json) (`2025-06-24T00:15:26.213`)
|
||||
- [CVE-2025-6533](CVE-2025/CVE-2025-65xx/CVE-2025-6533.json) (`2025-06-24T00:15:26.397`)
|
||||
- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-24T01:15:25.303`)
|
||||
- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T01:15:25.513`)
|
||||
- [CVE-2025-34041](CVE-2025/CVE-2025-340xx/CVE-2025-34041.json) (`2025-06-24T02:15:22.820`)
|
||||
- [CVE-2025-48461](CVE-2025/CVE-2025-484xx/CVE-2025-48461.json) (`2025-06-24T03:15:33.613`)
|
||||
- [CVE-2025-48462](CVE-2025/CVE-2025-484xx/CVE-2025-48462.json) (`2025-06-24T03:15:33.753`)
|
||||
- [CVE-2025-48463](CVE-2025/CVE-2025-484xx/CVE-2025-48463.json) (`2025-06-24T03:15:33.870`)
|
||||
- [CVE-2025-48466](CVE-2025/CVE-2025-484xx/CVE-2025-48466.json) (`2025-06-24T03:15:34.013`)
|
||||
- [CVE-2025-48467](CVE-2025/CVE-2025-484xx/CVE-2025-48467.json) (`2025-06-24T03:15:34.140`)
|
||||
- [CVE-2025-48468](CVE-2025/CVE-2025-484xx/CVE-2025-48468.json) (`2025-06-24T03:15:34.267`)
|
||||
- [CVE-2025-48469](CVE-2025/CVE-2025-484xx/CVE-2025-48469.json) (`2025-06-24T03:15:34.390`)
|
||||
- [CVE-2025-48470](CVE-2025/CVE-2025-484xx/CVE-2025-48470.json) (`2025-06-24T03:15:34.523`)
|
||||
- [CVE-2025-52560](CVE-2025/CVE-2025-525xx/CVE-2025-52560.json) (`2025-06-24T03:15:34.653`)
|
||||
- [CVE-2025-52574](CVE-2025/CVE-2025-525xx/CVE-2025-52574.json) (`2025-06-24T03:15:34.797`)
|
||||
- [CVE-2025-52971](CVE-2025/CVE-2025-529xx/CVE-2025-52971.json) (`2025-06-24T03:15:34.947`)
|
||||
- [CVE-2025-52972](CVE-2025/CVE-2025-529xx/CVE-2025-52972.json) (`2025-06-24T03:15:35.027`)
|
||||
- [CVE-2025-52973](CVE-2025/CVE-2025-529xx/CVE-2025-52973.json) (`2025-06-24T03:15:35.090`)
|
||||
- [CVE-2025-52974](CVE-2025/CVE-2025-529xx/CVE-2025-52974.json) (`2025-06-24T03:15:35.147`)
|
||||
- [CVE-2025-52975](CVE-2025/CVE-2025-529xx/CVE-2025-52975.json) (`2025-06-24T03:15:35.210`)
|
||||
- [CVE-2025-52976](CVE-2025/CVE-2025-529xx/CVE-2025-52976.json) (`2025-06-24T03:15:35.270`)
|
||||
- [CVE-2025-52977](CVE-2025/CVE-2025-529xx/CVE-2025-52977.json) (`2025-06-24T03:15:35.333`)
|
||||
- [CVE-2025-52978](CVE-2025/CVE-2025-529xx/CVE-2025-52978.json) (`2025-06-24T03:15:35.393`)
|
||||
- [CVE-2025-52979](CVE-2025/CVE-2025-529xx/CVE-2025-52979.json) (`2025-06-24T03:15:35.453`)
|
||||
- [CVE-2025-6536](CVE-2025/CVE-2025-65xx/CVE-2025-6536.json) (`2025-06-24T02:15:22.967`)
|
||||
- [CVE-2025-6551](CVE-2025/CVE-2025-65xx/CVE-2025-6551.json) (`2025-06-24T02:15:23.170`)
|
||||
- [CVE-2025-6552](CVE-2025/CVE-2025-65xx/CVE-2025-6552.json) (`2025-06-24T03:15:35.520`)
|
||||
- [CVE-2025-6559](CVE-2025/CVE-2025-65xx/CVE-2025-6559.json) (`2025-06-24T03:15:35.700`)
|
||||
- [CVE-2025-6560](CVE-2025/CVE-2025-65xx/CVE-2025-6560.json) (`2025-06-24T03:15:35.897`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `29`
|
||||
Recently modified CVEs: `6`
|
||||
|
||||
- [CVE-2024-40113](CVE-2024/CVE-2024-401xx/CVE-2024-40113.json) (`2025-06-24T01:00:53.330`)
|
||||
- [CVE-2024-40114](CVE-2024/CVE-2024-401xx/CVE-2024-40114.json) (`2025-06-24T00:59:48.440`)
|
||||
- [CVE-2024-40494](CVE-2024/CVE-2024-404xx/CVE-2024-40494.json) (`2025-06-24T01:11:48.770`)
|
||||
- [CVE-2024-41712](CVE-2024/CVE-2024-417xx/CVE-2024-41712.json) (`2025-06-24T01:30:56.780`)
|
||||
- [CVE-2024-41714](CVE-2024/CVE-2024-417xx/CVE-2024-41714.json) (`2025-06-24T01:29:55.607`)
|
||||
- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2025-06-24T01:09:04.613`)
|
||||
- [CVE-2024-47224](CVE-2024/CVE-2024-472xx/CVE-2024-47224.json) (`2025-06-24T01:21:34.700`)
|
||||
- [CVE-2024-50658](CVE-2024/CVE-2024-506xx/CVE-2024-50658.json) (`2025-06-24T00:17:53.820`)
|
||||
- [CVE-2024-50931](CVE-2024/CVE-2024-509xx/CVE-2024-50931.json) (`2025-06-24T00:38:36.073`)
|
||||
- [CVE-2024-51165](CVE-2024/CVE-2024-511xx/CVE-2024-51165.json) (`2025-06-24T00:37:18.360`)
|
||||
- [CVE-2024-55008](CVE-2024/CVE-2024-550xx/CVE-2024-55008.json) (`2025-06-24T00:19:17.740`)
|
||||
- [CVE-2024-55089](CVE-2024/CVE-2024-550xx/CVE-2024-55089.json) (`2025-06-24T00:32:09.147`)
|
||||
- [CVE-2024-56737](CVE-2024/CVE-2024-567xx/CVE-2024-56737.json) (`2025-06-24T00:30:45.817`)
|
||||
- [CVE-2024-56738](CVE-2024/CVE-2024-567xx/CVE-2024-56738.json) (`2025-06-24T00:29:03.183`)
|
||||
- [CVE-2024-57427](CVE-2024/CVE-2024-574xx/CVE-2024-57427.json) (`2025-06-24T00:13:56.393`)
|
||||
- [CVE-2024-57428](CVE-2024/CVE-2024-574xx/CVE-2024-57428.json) (`2025-06-24T00:13:30.770`)
|
||||
- [CVE-2024-57429](CVE-2024/CVE-2024-574xx/CVE-2024-57429.json) (`2025-06-24T00:13:05.303`)
|
||||
- [CVE-2024-57430](CVE-2024/CVE-2024-574xx/CVE-2024-57430.json) (`2025-06-24T00:12:38.623`)
|
||||
- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-06-24T00:54:20.497`)
|
||||
- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-06-24T00:50:39.497`)
|
||||
- [CVE-2025-27622](CVE-2025/CVE-2025-276xx/CVE-2025-27622.json) (`2025-06-24T00:48:40.867`)
|
||||
- [CVE-2025-27623](CVE-2025/CVE-2025-276xx/CVE-2025-27623.json) (`2025-06-24T00:46:38.817`)
|
||||
- [CVE-2025-27624](CVE-2025/CVE-2025-276xx/CVE-2025-27624.json) (`2025-06-24T00:45:20.613`)
|
||||
- [CVE-2025-27625](CVE-2025/CVE-2025-276xx/CVE-2025-27625.json) (`2025-06-24T00:42:16.010`)
|
||||
- [CVE-2025-5777](CVE-2025/CVE-2025-57xx/CVE-2025-5777.json) (`2025-06-24T01:15:25.177`)
|
||||
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-24T03:15:32.860`)
|
||||
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-24T03:15:32.987`)
|
||||
- [CVE-2025-34033](CVE-2025/CVE-2025-340xx/CVE-2025-34033.json) (`2025-06-24T03:15:33.090`)
|
||||
- [CVE-2025-34034](CVE-2025/CVE-2025-340xx/CVE-2025-34034.json) (`2025-06-24T03:15:33.193`)
|
||||
- [CVE-2025-34035](CVE-2025/CVE-2025-340xx/CVE-2025-34035.json) (`2025-06-24T03:15:33.293`)
|
||||
- [CVE-2025-34037](CVE-2025/CVE-2025-340xx/CVE-2025-34037.json) (`2025-06-24T03:15:33.400`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
110
_state.csv
110
_state.csv
@ -158180,7 +158180,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9
|
||||
CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000
|
||||
CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000
|
||||
CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000
|
||||
CVE-2020-3432,0,1,7b9dd4847d8e685f84ed811f15fe603d796ba0d6dc9eb217158a5ab61aef0fd6,2025-06-24T00:12:09.860000
|
||||
CVE-2020-3432,0,0,7b9dd4847d8e685f84ed811f15fe603d796ba0d6dc9eb217158a5ab61aef0fd6,2025-06-24T00:12:09.860000
|
||||
CVE-2020-3433,0,0,2c85045431b9488c2e1c1014ac599de02c76a7bc319f5ca94e1cd53433e20ccb,2025-02-24T15:40:28.853000
|
||||
CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000
|
||||
CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000
|
||||
@ -246590,7 +246590,7 @@ CVE-2024-11180,0,0,cdec5a9c38ec7cebf1f7443845585c3611f8e72d34f49cbe56c66f786a235
|
||||
CVE-2024-11181,0,0,a4dfe2e9b1369646dd874247071d27c45ff304ea068bd5a32b412f0bd0fabfa7,2025-06-05T15:59:04.970000
|
||||
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
|
||||
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
|
||||
CVE-2024-11184,0,1,5e0f3b1fcccf830b61b8807e8c6ade803178071eac4fdff84f6bc889bc3ded1a,2025-06-24T00:21:37.557000
|
||||
CVE-2024-11184,0,0,5e0f3b1fcccf830b61b8807e8c6ade803178071eac4fdff84f6bc889bc3ded1a,2025-06-24T00:21:37.557000
|
||||
CVE-2024-11185,0,0,1932fde8da4ceff0aad2c8c397b6223b173c5e24bf16e388d91260742a2a8c8f,2025-05-28T15:01:30.720000
|
||||
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
|
||||
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
|
||||
@ -256881,7 +256881,7 @@ CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f5
|
||||
CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000
|
||||
CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000
|
||||
CVE-2024-28714,0,0,2016e8accbb7084f74d0c24ce4b81c6735174694ae204335fd0b22c9533ecf84,2025-06-10T00:54:10.907000
|
||||
CVE-2024-28715,0,1,ab720d17e0d86e1593c42e240ca075220478c0940b7fabd2dded908a3ff2bc27,2025-06-24T01:35:34.217000
|
||||
CVE-2024-28715,0,0,ab720d17e0d86e1593c42e240ca075220478c0940b7fabd2dded908a3ff2bc27,2025-06-24T01:35:34.217000
|
||||
CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000
|
||||
CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000
|
||||
CVE-2024-28718,0,0,3096999cb272c6431967462199f78848dfa9cb1ba9fb353933e95c4783c90e4b,2025-06-17T21:00:54.593000
|
||||
@ -258655,7 +258655,7 @@ CVE-2024-31013,0,0,c8b08beaa05aa5eafe964510521b6e1a3b6ffa974e1c46ebca30a5ea5eebf
|
||||
CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000
|
||||
CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000
|
||||
CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000
|
||||
CVE-2024-31029,0,1,0ad84b017b6a8c0527e0ed95395dc7b2a26c66fc7b27003012e640ff9bc2c168,2025-06-24T01:13:44.843000
|
||||
CVE-2024-31029,0,0,0ad84b017b6a8c0527e0ed95395dc7b2a26c66fc7b27003012e640ff9bc2c168,2025-06-24T01:13:44.843000
|
||||
CVE-2024-3103,0,0,7fb83952d934c1ed84cba523651fd78d88e84c01517f86d3d43c873d9254ed5e,2025-02-11T02:15:34.540000
|
||||
CVE-2024-31030,0,0,0899af33ddc85c61766a5d983aabfa57cd7e5edc2db4db31a6f0c031431e3012,2024-11-21T09:12:44.697000
|
||||
CVE-2024-31031,0,0,98b230fd7cf6eeeefd08aaf7e96cb284e87853697db416e7d61ba5fd0934a026,2025-06-18T19:40:24.270000
|
||||
@ -265887,8 +265887,8 @@ CVE-2024-4011,0,0,023a65dd1f5eb72b47a28389dd0798106b90c6451db9a08d936ec1bf45bba7
|
||||
CVE-2024-40110,0,0,7977104a17d98c8ed6f9bcceda6dc05f4e647c9fc83bc6f905a0f6c4f3a00efd,2025-04-23T14:19:36.130000
|
||||
CVE-2024-40111,0,0,35b0050b7d8d9045b9cae343cd8e95f47419f422608243682c7eeeadc6be1b0f,2025-04-21T14:38:21.703000
|
||||
CVE-2024-40112,0,0,9bd607e73ee88fab8d46057c2aa6063bb553d5003fa47439a632f9a6a40da816,2025-06-02T19:15:25.003000
|
||||
CVE-2024-40113,0,1,35937a6fb996a4bf5f74aedd3c102f3a45ca4145b975dc7fc398488b3b9fce7e,2025-06-24T01:00:53.330000
|
||||
CVE-2024-40114,0,1,e08ecdbbc683b7115924e32d1c960fce483393c42b5312dfc045964ea8ac9b2f,2025-06-24T00:59:48.440000
|
||||
CVE-2024-40113,0,0,35937a6fb996a4bf5f74aedd3c102f3a45ca4145b975dc7fc398488b3b9fce7e,2025-06-24T01:00:53.330000
|
||||
CVE-2024-40114,0,0,e08ecdbbc683b7115924e32d1c960fce483393c42b5312dfc045964ea8ac9b2f,2025-06-24T00:59:48.440000
|
||||
CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670222,2025-03-26T16:15:20.330000
|
||||
CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000
|
||||
CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000
|
||||
@ -266003,7 +266003,7 @@ CVE-2024-40488,0,0,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b
|
||||
CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000
|
||||
CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000
|
||||
CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000
|
||||
CVE-2024-40494,0,1,8f23025815b1e2f4780baf03b62bd886460c2c4b50385e825eef67659a86f249,2025-06-24T01:11:48.770000
|
||||
CVE-2024-40494,0,0,8f23025815b1e2f4780baf03b62bd886460c2c4b50385e825eef67659a86f249,2025-06-24T01:11:48.770000
|
||||
CVE-2024-40495,0,0,1c9732481c995a3ecead089b39a64e9ee5c85132819c111045be77c58b37253c,2025-03-13T14:15:30.270000
|
||||
CVE-2024-40498,0,0,87dac0a04dde5c7b7d6e4bba8f975c746a26b85fad012a6c4a30536ac112c101,2024-08-06T16:30:24.547000
|
||||
CVE-2024-40500,0,0,6ef0dec3732dba29c28c16bc6e8be9cd17ef4cef498f58a8c690fd37b8dddb98,2024-08-21T16:05:32.603000
|
||||
@ -266921,9 +266921,9 @@ CVE-2024-41709,0,0,2b9faa9660224ef04837ccdfcafb9813d06bd10cec2927cfd9c0ac07e7430
|
||||
CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000
|
||||
CVE-2024-41710,0,0,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000
|
||||
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
|
||||
CVE-2024-41712,0,1,d73c1d27bc50b61ff3b541a55b3e4da47196afc07f0f441c3742538898de0b6a,2025-06-24T01:30:56.780000
|
||||
CVE-2024-41712,0,0,d73c1d27bc50b61ff3b541a55b3e4da47196afc07f0f441c3742538898de0b6a,2025-06-24T01:30:56.780000
|
||||
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
|
||||
CVE-2024-41714,0,1,83d4ce9e6d2ccd00c3dad3ff839a320f093b18515266d45961ec3e2e3216f7c7,2025-06-24T01:29:55.607000
|
||||
CVE-2024-41714,0,0,83d4ce9e6d2ccd00c3dad3ff839a320f093b18515266d45961ec3e2e3216f7c7,2025-06-24T01:29:55.607000
|
||||
CVE-2024-41715,0,0,55a3928b1510ffef142699cda3e2cd76f227f18a2c54b340de368b98196250b2,2024-10-17T17:15:11.530000
|
||||
CVE-2024-41716,0,0,c449ec87df6d90ba0adfc5fd5f3a85f5f0cc0ce39dc439223fd923327707f9d8,2025-03-13T15:15:47.003000
|
||||
CVE-2024-41717,0,0,c9f80448cdc976f3002da313ea63287cd63a05c44fc79274549925f22ad726a5,2024-10-23T15:12:34.673000
|
||||
@ -270513,7 +270513,7 @@ CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c
|
||||
CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
|
||||
CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
|
||||
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
|
||||
CVE-2024-46478,0,1,a257cefeeec0265594923947771175b9150a1daf6cc6efda8e93fb88b3f715e2,2025-06-24T01:09:04.613000
|
||||
CVE-2024-46478,0,0,a257cefeeec0265594923947771175b9150a1daf6cc6efda8e93fb88b3f715e2,2025-06-24T01:09:04.613000
|
||||
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
|
||||
CVE-2024-4648,0,0,a64bb421321ecf5edddde289247f2be9eb6d00e91a0d8a91994337a2d7ef771c,2025-02-19T18:04:02.307000
|
||||
CVE-2024-46480,0,0,ff7dc1722880813d8ff3e28d1dccf547b3a865b2546150ea45115323f8573725,2025-01-13T20:15:28.147000
|
||||
@ -271167,7 +271167,7 @@ CVE-2024-47220,0,0,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e
|
||||
CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af0ed,2025-03-19T16:15:28.600000
|
||||
CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000
|
||||
CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000
|
||||
CVE-2024-47224,0,1,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000
|
||||
CVE-2024-47224,0,0,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000
|
||||
CVE-2024-47226,0,0,0c9114a6d7b06793fb4df4318fa93c3350cc9dd0329f9a1b32db743ff9d392dd,2025-02-10T22:15:35.383000
|
||||
CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000
|
||||
CVE-2024-4723,0,0,181284b6c997036a8e9487f6d01498e20f407a2bf8f4592e413d9384c6be6c62,2025-02-19T18:33:16.710000
|
||||
@ -273930,7 +273930,7 @@ CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739c
|
||||
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
|
||||
CVE-2024-50656,0,0,f0a8a495a13d600435eacdcf0244ff9923ebaa5af09d757b30ef2869e7ea9da5,2025-03-19T18:15:23.200000
|
||||
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
|
||||
CVE-2024-50658,0,1,7898e3f499416d584f6e62496c9f05779ea02eff42dcb5c945e2c7146f377e87,2025-06-24T00:17:53.820000
|
||||
CVE-2024-50658,0,0,7898e3f499416d584f6e62496c9f05779ea02eff42dcb5c945e2c7146f377e87,2025-06-24T00:17:53.820000
|
||||
CVE-2024-50659,0,0,149f06eac12099089379c01d894271cfdbe8590201e97c4a87009d93de3236e3,2025-01-08T16:15:34.597000
|
||||
CVE-2024-5066,0,0,da20a36df4ae005c3f3c1411b8e32bd9eb2b4f19552801b4eb562d04f97b3f8c,2025-03-03T16:13:18.990000
|
||||
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
|
||||
@ -274041,7 +274041,7 @@ CVE-2024-50928,0,0,ada67f2fe353aa1b7ced6a9deb8a0c7b6223eab28709c3283d81f0a7c20ec
|
||||
CVE-2024-50929,0,0,834efd5e551720df1eaed9299c86c084dd2e69f9c40050772dafa31cc6ddac9b,2024-12-11T16:15:13.113000
|
||||
CVE-2024-5093,0,0,3381b2d75db326726a4e09211cacf9703517f305d39e11cd5f4617ce5f18de83,2025-02-10T14:39:43.950000
|
||||
CVE-2024-50930,0,0,6d6b0bf05a5beb39024fe11b26d3f363e871c0c6f62f0c287cbea52175dc4b00,2024-12-12T02:06:39.577000
|
||||
CVE-2024-50931,0,1,e965ba7ff96dda263709d693f968de237be21440732e2511f6394ef82bd3612e,2025-06-24T00:38:36.073000
|
||||
CVE-2024-50931,0,0,e965ba7ff96dda263709d693f968de237be21440732e2511f6394ef82bd3612e,2025-06-24T00:38:36.073000
|
||||
CVE-2024-5094,0,0,c4bf8f3b10d77fb6e41e4a8adff10e5a5809b9d01a240dbe491d9e10a6476b88,2025-02-10T14:40:20.827000
|
||||
CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000
|
||||
CVE-2024-50944,0,0,b076fd8f2f10d50911c6afe5f96c302ad9e2ba9d556044ae62121186adbd1b23,2024-12-28T19:15:06.197000
|
||||
@ -274174,7 +274174,7 @@ CVE-2024-5116,0,0,4a940c91ec1fc17659226b607e57d928e24a4574770bd02c4de1e998985b38
|
||||
CVE-2024-51162,0,0,f7989da3f04acdeccd7ac3514256e7ada64944ea90830784c7f181e1b7a668f8,2025-03-17T15:15:42.383000
|
||||
CVE-2024-51163,0,0,8265e829e2344f7d7c5f73a82b08aadda352aa4cac2ac65fb619729ab1ada0ce,2025-03-18T19:15:45.977000
|
||||
CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000
|
||||
CVE-2024-51165,0,1,09e5a4cbc73bfd1107c50fbe64157b349956df181d1c4b7056fae5fc4f19af9f,2025-06-24T00:37:18.360000
|
||||
CVE-2024-51165,0,0,09e5a4cbc73bfd1107c50fbe64157b349956df181d1c4b7056fae5fc4f19af9f,2025-06-24T00:37:18.360000
|
||||
CVE-2024-5117,0,0,5d864bcdab117f69756aa6d93fdfc3ee233ea8f77d067abd8ad72750b44d714f,2025-02-10T14:35:26.263000
|
||||
CVE-2024-51175,0,0,885b2e6c4d0fe90cff1f4b68a37268cb67e344c66db871427ee77d237ace4796,2024-12-18T16:15:13.807000
|
||||
CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000
|
||||
@ -276944,7 +276944,7 @@ CVE-2024-54998,0,0,03590b3c391b5b47d800e1d2036adf4bc4b08a27407c62b36182682faa965
|
||||
CVE-2024-54999,0,0,7d688b5e6850db35622cee3d7c13ceaf526f67556bf50ea8d38cf86c561fb155,2025-01-13T21:15:13.497000
|
||||
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
|
||||
CVE-2024-55000,0,0,e280c3cc064d727179462b9cd205f0c92515872f32e7a1750a9b7cca5e8a5e01,2025-04-23T21:36:36.840000
|
||||
CVE-2024-55008,0,1,d4c98368bc64c087d2e1fcb093966fd10a9f20063391432efcebf491a2bd9f26,2025-06-24T00:19:17.740000
|
||||
CVE-2024-55008,0,0,d4c98368bc64c087d2e1fcb093966fd10a9f20063391432efcebf491a2bd9f26,2025-06-24T00:19:17.740000
|
||||
CVE-2024-55009,0,0,4d88f6b549f01d05c58601be5c8229fe460db1c49b9016496ca0b7d11afb4b4a,2025-03-24T17:45:45.890000
|
||||
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
|
||||
CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000
|
||||
@ -276978,7 +276978,7 @@ CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2
|
||||
CVE-2024-55085,0,0,0f4fecc56e251268778b80985d2c1b91c76af733933826a0e50972ec63399469,2025-04-17T01:57:38.213000
|
||||
CVE-2024-55086,0,0,fd47329e3e3807784056f0ae7a5ed1c4b66291f3c4daeca68905d8bcba1533f7,2025-04-18T17:25:15.047000
|
||||
CVE-2024-55088,0,0,adb05dfe3dc143c162a1807a74bc7b72a6799fd57e16689b3b44852521dbb401,2025-04-17T01:56:28.640000
|
||||
CVE-2024-55089,0,1,ae30a2e50e3df2f6ac7905dbb62b2ad50ccd1ff6bca04780daa978f3fdca6c3e,2025-06-24T00:32:09.147000
|
||||
CVE-2024-55089,0,0,ae30a2e50e3df2f6ac7905dbb62b2ad50ccd1ff6bca04780daa978f3fdca6c3e,2025-06-24T00:32:09.147000
|
||||
CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000
|
||||
CVE-2024-55093,0,0,b79b9e742f68681ca2ef1cb7df673f45058b48ef3359bdbf2d877411d5b9fb92,2025-04-23T18:32:54.217000
|
||||
CVE-2024-55099,0,0,bb5d8038fff96f2ebdc264769fc895066bde62862ee7a940cb7e11a89bf7adf5,2025-04-03T16:32:04.010000
|
||||
@ -277962,8 +277962,8 @@ CVE-2024-56732,0,0,b8afa550e07ced01fe4bc3771dd4e27eb321ef6d140ae1b0e0a8b01eb97cd
|
||||
CVE-2024-56733,0,0,c2474ef73dd56102a08444876977f4dc5534d1c12671d5b5a9d94af958afe92a,2024-12-30T17:15:09.990000
|
||||
CVE-2024-56734,0,0,127527bdaefb81c9eb3e5f3c9aeb8fcd2a7203002690791775ac4a054e77c7cf,2024-12-30T17:15:10.133000
|
||||
CVE-2024-56736,0,0,f99faeb31f8f53f2cd7c7144f1f796ff7bda23a03c396d929f617bb9d04d038e,2025-04-23T19:13:22.287000
|
||||
CVE-2024-56737,0,1,e19b621e81bd19375dfddc6b7ad64275db36dbba5f79cccb4da4f5d3106bb5ac,2025-06-24T00:30:45.817000
|
||||
CVE-2024-56738,0,1,f78f4f4cd72ad012370e41f0aff8079ec1623c39826da7a24bb7518196761616,2025-06-24T00:29:03.183000
|
||||
CVE-2024-56737,0,0,e19b621e81bd19375dfddc6b7ad64275db36dbba5f79cccb4da4f5d3106bb5ac,2025-06-24T00:30:45.817000
|
||||
CVE-2024-56738,0,0,f78f4f4cd72ad012370e41f0aff8079ec1623c39826da7a24bb7518196761616,2025-06-24T00:29:03.183000
|
||||
CVE-2024-56739,0,0,4f6c09aecb431282e0adb0614c417ec109730556bc26b8429f533744c616ad23,2025-01-07T21:21:31.403000
|
||||
CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000
|
||||
CVE-2024-56740,0,0,70a50e80e6a90e1d35505246d853ee996c83b7e5576c2651235f05a5725944be,2025-01-07T22:24:05.593000
|
||||
@ -278285,11 +278285,11 @@ CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f0
|
||||
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
|
||||
CVE-2024-57423,0,0,429f48fbaf4d5ee4a0cd9793b36f1772e906da37e9a96d25c9aa463c5f307f7e,2025-04-07T18:45:18.343000
|
||||
CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000
|
||||
CVE-2024-57427,0,1,7b0850565fd1a3e60c7f6c51d0338062cc137b7a7c1b3dcc1431a9586985f965,2025-06-24T00:13:56.393000
|
||||
CVE-2024-57428,0,1,f8af63df4d5299734d280e4c907fb090afce81f8d4786f9daabb293aebe652ab,2025-06-24T00:13:30.770000
|
||||
CVE-2024-57429,0,1,cd9c465c7350beb6f4629437e1f5699878bf6325c073fd6900a1e3d91de52d96,2025-06-24T00:13:05.303000
|
||||
CVE-2024-57427,0,0,7b0850565fd1a3e60c7f6c51d0338062cc137b7a7c1b3dcc1431a9586985f965,2025-06-24T00:13:56.393000
|
||||
CVE-2024-57428,0,0,f8af63df4d5299734d280e4c907fb090afce81f8d4786f9daabb293aebe652ab,2025-06-24T00:13:30.770000
|
||||
CVE-2024-57429,0,0,cd9c465c7350beb6f4629437e1f5699878bf6325c073fd6900a1e3d91de52d96,2025-06-24T00:13:05.303000
|
||||
CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000
|
||||
CVE-2024-57430,0,1,73ef528a86b34f798a23c35d9b2d10d0ac59fa81eb78113a9cec45056067f1fd,2025-06-24T00:12:38.623000
|
||||
CVE-2024-57430,0,0,73ef528a86b34f798a23c35d9b2d10d0ac59fa81eb78113a9cec45056067f1fd,2025-06-24T00:12:38.623000
|
||||
CVE-2024-57432,0,0,380d211416623b84511e89447189d47b0683a0b0ccc670e5ff43709b349e197a,2025-03-13T14:15:34.393000
|
||||
CVE-2024-57433,0,0,6410b406a0e0b152007902343f9fefbfa962b28d3b64850e594a5feb9fbf15e9,2025-04-22T15:32:09.543000
|
||||
CVE-2024-57434,0,0,4244b330e3a1885db4ab6f35e89cd62516d8c5c96589e07e344c7d548e1386e0,2025-04-22T15:29:06.090000
|
||||
@ -288966,7 +288966,7 @@ CVE-2025-2610,0,0,d9535a1c139910205321aca35370cfc0b0260764ca92a5dd60f7ed3f175def
|
||||
CVE-2025-26125,0,0,4ae7f7ba353601c45dbee82b55634f507486c612ec0e7fb0295802c5ca1a95ba,2025-03-24T13:15:25.920000
|
||||
CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6d15,2025-03-17T18:15:21.860000
|
||||
CVE-2025-2613,0,0,f71787ed84ffbf1c331c926037e10f24c0e248005493cbe1f0f2c6e85a68fd24,2025-04-21T14:23:45.950000
|
||||
CVE-2025-26136,0,1,dd9385473c9de6671090737c25c945df8fcb57e05d63e2da81bba3bba0b8a98a,2025-06-24T00:54:20.497000
|
||||
CVE-2025-26136,0,0,dd9385473c9de6671090737c25c945df8fcb57e05d63e2da81bba3bba0b8a98a,2025-06-24T00:54:20.497000
|
||||
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
|
||||
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
|
||||
CVE-2025-26153,0,0,fbd54e08d3ed017020223f9a7b6b482516a3990fb93f496abb0ee8889236b21e,2025-04-18T12:15:15.033000
|
||||
@ -289024,7 +289024,7 @@ CVE-2025-26310,0,0,bb747416a75309b2ca1743631d93c303f929a0869d292e44b67e8cc57059c
|
||||
CVE-2025-26311,0,0,dcc2d91354c6953620d7cd9d6f4d7e8f27be741909235cc9365a55dbbf5c64c2,2025-04-17T18:05:28.417000
|
||||
CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000
|
||||
CVE-2025-26318,0,0,84d066d40995f86f82311ffc56dc1f81fd70a062203c7c5ea702e8cb9cb3ac6c,2025-04-03T14:15:31.493000
|
||||
CVE-2025-26319,0,1,fef01cd98d2fb4f5b4a27b14dc42c0de2b3827b06a99cb65c6ed5675e692e01d,2025-06-24T00:50:39.497000
|
||||
CVE-2025-26319,0,0,fef01cd98d2fb4f5b4a27b14dc42c0de2b3827b06a99cb65c6ed5675e692e01d,2025-06-24T00:50:39.497000
|
||||
CVE-2025-2632,0,0,2dd8e8421446af075f78efef400514791a43dd10d04914537d27aeda54aae080,2025-04-11T15:40:10.277000
|
||||
CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000
|
||||
CVE-2025-26325,0,0,2e5ceacac9fb18c7c9bbe167db2438cbf5683b3622ff11580ca9540807c11c99,2025-04-10T17:28:00.773000
|
||||
@ -290023,10 +290023,10 @@ CVE-2025-27615,0,0,dffb5f3398f09a513420b3be1d64f06c647ff90a89a35bcb5178bc8bdf5ab
|
||||
CVE-2025-27616,0,0,aa85adc195b5955511bb21f9cfe98ae7538d310a0fced9a0aeaaa4a683a54ec6,2025-03-10T19:15:41.080000
|
||||
CVE-2025-27617,0,0,301ffaccadc2ce8c8d5bb86b9b969df111c43a03b8d988cca8ae24179376e48c,2025-03-11T16:15:18.310000
|
||||
CVE-2025-2762,0,0,829fc248e3d8245ea40a9748f202281af81aadc309b6f1752ec9d6c292dde219,2025-04-29T13:52:47.470000
|
||||
CVE-2025-27622,0,1,7fb5c8f8e020078a9a159e8fc3a43a779f12ae5f2ebc198b85d2f93f81663462,2025-06-24T00:48:40.867000
|
||||
CVE-2025-27623,0,1,d810ebe6850eefc0e4d2c5e6455a1d4209b1343c58e2b568376aebf43b9905ba,2025-06-24T00:46:38.817000
|
||||
CVE-2025-27624,0,1,1a2e32356995ba134586f112ebb661a70663489beed98e1ada04ca642cdb5553,2025-06-24T00:45:20.613000
|
||||
CVE-2025-27625,0,1,4314492f98358060afb68934de0a8daabd38050ca5e9adb40c671e7d46b6f624,2025-06-24T00:42:16.010000
|
||||
CVE-2025-27622,0,0,7fb5c8f8e020078a9a159e8fc3a43a779f12ae5f2ebc198b85d2f93f81663462,2025-06-24T00:48:40.867000
|
||||
CVE-2025-27623,0,0,d810ebe6850eefc0e4d2c5e6455a1d4209b1343c58e2b568376aebf43b9905ba,2025-06-24T00:46:38.817000
|
||||
CVE-2025-27624,0,0,1a2e32356995ba134586f112ebb661a70663489beed98e1ada04ca642cdb5553,2025-06-24T00:45:20.613000
|
||||
CVE-2025-27625,0,0,4314492f98358060afb68934de0a8daabd38050ca5e9adb40c671e7d46b6f624,2025-06-24T00:42:16.010000
|
||||
CVE-2025-2763,0,0,b362b6f3ba794553331e941e273490f6e3566b052044c350899fb3ad9b0f52fc,2025-04-29T13:52:47.470000
|
||||
CVE-2025-27631,0,0,b515a6ae2dd38363f2c2c2d7543d195231ce240fb0aace417e20d81978794417,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27632,0,0,f938475bec3d54e9af6729719b2a8eb383c12c8f5092f562b95c9a54bf2645ab,2025-03-27T16:45:46.410000
|
||||
@ -293665,14 +293665,18 @@ CVE-2025-34028,0,0,5921097810a177c4353bfac19f550e88ddb782dc2bdfd50f1c119b90d9521
|
||||
CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000
|
||||
CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000
|
||||
CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000
|
||||
CVE-2025-34031,1,1,d674798b60926c158bbb7bb2ed37489f3fec5cf14ecb839d75a5ecaf440233ac,2025-06-24T01:15:23.340000
|
||||
CVE-2025-34032,1,1,1ffec99489e181c39b05eb5cbdd8518148acd077ccb9c01dac67fa321ff5bac6,2025-06-24T01:15:24.350000
|
||||
CVE-2025-34033,1,1,dffe0e9a3e5ee29453eb3edace0da3850a7b2f9d4964b9671fa378b48abbe22f,2025-06-24T01:15:24.493000
|
||||
CVE-2025-34034,1,1,d1f1f09fd63f4f58e398122c8aaa997fcdef4865d9a65b4c3a6fc6bb27b65b36,2025-06-24T01:15:24.630000
|
||||
CVE-2025-34035,1,1,65671e3ec5b12513e7f829e6b47189e2c9ad951a7d5a9be90d1140906217654d,2025-06-24T01:15:24.763000
|
||||
CVE-2025-34036,1,1,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000
|
||||
CVE-2025-34037,1,1,81976660092318b594423c402c70444ef718cbe43821372ad6d92bf8074adec2,2025-06-24T01:15:25.037000
|
||||
CVE-2025-34031,0,1,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82428,2025-06-24T03:15:32.860000
|
||||
CVE-2025-34032,0,1,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
|
||||
CVE-2025-34033,0,1,efbb2094e27eadf32cf2e2b87f771d72dc8ffd0952a128e2c253c810271eb5fe,2025-06-24T03:15:33.090000
|
||||
CVE-2025-34034,0,1,9349522151798c41468e27385e7fbe77af654ab0fc85de66c1e4f22953696889,2025-06-24T03:15:33.193000
|
||||
CVE-2025-34035,0,1,ce2721f03a0b278f0cc26f99ff904d9fab13fc67019d936b442cf9447da7781d,2025-06-24T03:15:33.293000
|
||||
CVE-2025-34036,0,0,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000
|
||||
CVE-2025-34037,0,1,57a7e6a6846827b91b7736feffed008814a2f3414dc595a6f1c81aa1a94cc3f7,2025-06-24T03:15:33.400000
|
||||
CVE-2025-34038,1,1,d6d8009e58294a673d7d0c556296273a5a5d83087c8fbf680e06184934d5f96d,2025-06-24T03:15:33.507000
|
||||
CVE-2025-34039,1,1,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0806,2025-06-24T02:15:22.540000
|
||||
CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000
|
||||
CVE-2025-34040,1,1,ab246a583bbce961c122b7ec2fd5e7d841d24372c199b5859888943ef451ba8c,2025-06-24T02:15:22.673000
|
||||
CVE-2025-34041,1,1,e333513a767b39341f0e963179ee4f68eb159feea05cdd92f7bde27fcf9c7f8e,2025-06-24T02:15:22.820000
|
||||
CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
|
||||
CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000
|
||||
@ -297337,7 +297341,15 @@ CVE-2025-48447,0,0,f1064a55c619ba121930a53f8ef33a80015883f6e69dc2f6e30ce6674f9bd
|
||||
CVE-2025-48448,0,0,d45e98596ff7c4bfe1172c4147c3bf90df1269483f2072c8e1e6cb8ccc1b62bf,2025-06-20T13:06:18.167000
|
||||
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
|
||||
CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18edc,2025-05-19T13:35:20.460000
|
||||
CVE-2025-48461,1,1,d4cb24a0ca958cfd524c8a208e61c21b45cf30bd8935dde1980a1409ead6ce43,2025-06-24T03:15:33.613000
|
||||
CVE-2025-48462,1,1,a92baa8fe34e131d9c05e73e0d06f620a35a927c149b8a5afca7f6d615e5a9f8,2025-06-24T03:15:33.753000
|
||||
CVE-2025-48463,1,1,7211400d6d7dbb163df4d1008261d95ee2fec45c1732b246e55db30906f17381,2025-06-24T03:15:33.870000
|
||||
CVE-2025-48466,1,1,302b754f6f6ff88f885556cb3e15791fcb2f400c2eea512dc96e81d9b734629b,2025-06-24T03:15:34.013000
|
||||
CVE-2025-48467,1,1,65ada2888e88fb5c0497eb399176437531d80946e5f7d88848de64f9fa9754e8,2025-06-24T03:15:34.140000
|
||||
CVE-2025-48468,1,1,e3f82796a87497059e9699052564dbe55665dc97b241dd7ec175041e0dcb7a93,2025-06-24T03:15:34.267000
|
||||
CVE-2025-48469,1,1,172cdce077fd14d9ebe336da59ab28d888edcd39b6f64ba16ee3c9ab53de8c80,2025-06-24T03:15:34.390000
|
||||
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
|
||||
CVE-2025-48470,1,1,bebff4979ebac402ac5fcc2e1f497aa497fdbbae56eeb86825f3178611a020e0,2025-06-24T03:15:34.523000
|
||||
CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000
|
||||
CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000
|
||||
CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000
|
||||
@ -298244,9 +298256,11 @@ CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be
|
||||
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52558,0,0,312418a98262707982a793371eca0fa75acc6958423c04e8a653116a74214a69,2025-06-23T21:15:26.423000
|
||||
CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000
|
||||
CVE-2025-52560,1,1,2816b0e31556b261f5ae164a073a7017e2fb8c2e87a00569de8e81436c2d8df6,2025-06-24T03:15:34.653000
|
||||
CVE-2025-52561,0,0,de14de6e04dddaa9a1477840b59ee04f631f59ec755018a4483ce3081c807b0a,2025-06-23T21:15:26.570000
|
||||
CVE-2025-52562,0,0,71dd25f3bc7ea4bcad36c0d751ccde968119f77e0cfe3d00439d8fcb91d44c5a,2025-06-23T21:15:26.710000
|
||||
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
|
||||
CVE-2025-52574,1,1,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
|
||||
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
|
||||
CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
|
||||
@ -298325,6 +298339,15 @@ CVE-2025-52967,0,0,f8f7ac307e05f8cf5c963f63b22d275fece0ae79c658522551054a17be453
|
||||
CVE-2025-52968,0,0,d8879824cdcdc2d7403d9f8f5973d765aba0466d5a7f5cf0c5e7fbb53155130e,2025-06-23T20:16:21.633000
|
||||
CVE-2025-52969,0,0,e5ee905bfae6a06ed06ff5a2c89561193059d838d7fdcd661c6efa26b26a470d,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
|
||||
CVE-2025-52971,1,1,237340cc6ffd385d40658506fb0d02f7f34a50767efaaaf31e1454a4e79cae88,2025-06-24T03:15:34.947000
|
||||
CVE-2025-52972,1,1,0da91a693f0d643d7ea643d24e82c310389052281e6c26df73d8b972947ca274,2025-06-24T03:15:35.027000
|
||||
CVE-2025-52973,1,1,7d03d2a4bdd2243951264a1c52d4bd2dcdfabc7047edac6879e8e21d20eb231e,2025-06-24T03:15:35.090000
|
||||
CVE-2025-52974,1,1,6f31d4020f09bd8d82d5225a40f7b3960e6a47d694d4e5d20d3e0b7b77742d96,2025-06-24T03:15:35.147000
|
||||
CVE-2025-52975,1,1,0e609d34e0c828e91e2598649e3ab30922da6dd0acaaaf197526bca81897c4a7,2025-06-24T03:15:35.210000
|
||||
CVE-2025-52976,1,1,7bb656783c842984a9024381f4b7750310ea675f33a84ba7515c3e41b3249efe,2025-06-24T03:15:35.270000
|
||||
CVE-2025-52977,1,1,f9eee2b0485a24704a632fb94ffd8d3e925d5899df987a156c8ee665b2646f0b,2025-06-24T03:15:35.333000
|
||||
CVE-2025-52978,1,1,536489d1a428144098c443cda432c2d1561802f8cd5aef013e6017d2712757fe,2025-06-24T03:15:35.393000
|
||||
CVE-2025-52979,1,1,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3712,2025-06-24T03:15:35.453000
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
|
||||
@ -298679,7 +298702,7 @@ CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648ad
|
||||
CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000
|
||||
CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000
|
||||
CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000
|
||||
CVE-2025-5777,0,1,0598dd8f984bb290ccf6035d8ab5d034dfa57295efc4f89d42d600fd8cf230ec,2025-06-24T01:15:25.177000
|
||||
CVE-2025-5777,0,0,0598dd8f984bb290ccf6035d8ab5d034dfa57295efc4f89d42d600fd8cf230ec,2025-06-24T01:15:25.177000
|
||||
CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000
|
||||
CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000
|
||||
@ -299132,10 +299155,15 @@ CVE-2025-6527,0,0,a9a66d6d6a8e0192016e66fcbc4b16654b5cc67da7f8d638e0a1029d3e911b
|
||||
CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000
|
||||
CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000
|
||||
CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000
|
||||
CVE-2025-6531,1,1,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000
|
||||
CVE-2025-6532,1,1,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
|
||||
CVE-2025-6533,1,1,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
|
||||
CVE-2025-6534,1,1,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
|
||||
CVE-2025-6535,1,1,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000
|
||||
CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000
|
||||
CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
|
||||
CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
|
||||
CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
|
||||
CVE-2025-6535,0,0,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000
|
||||
CVE-2025-6536,1,1,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
|
||||
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
|
||||
CVE-2025-6551,1,1,a52fe52125cb153ac1dee3a35a2dc92fb922b4d13172e77504580f4841a730e4,2025-06-24T02:15:23.170000
|
||||
CVE-2025-6552,1,1,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
|
||||
CVE-2025-6559,1,1,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
|
||||
CVE-2025-6560,1,1,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user