Auto-Update: 2025-06-24T04:00:33.568536+00:00

This commit is contained in:
cad-safe-bot 2025-06-24 04:04:12 +00:00
parent f9e7766ff6
commit 03771bd513
36 changed files with 1750 additions and 95 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34031", "id": "CVE-2025-34031",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:23.340", "published": "2025-06-24T01:15:23.340",
"lastModified": "2025-06-24T01:15:23.340", "lastModified": "2025-06-24T03:15:32.860",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -79,7 +79,7 @@
], ],
"references": [ "references": [
{ {
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-path-traversal", "url": "https://vulncheck.com/advisories/moodle-lms-jmol-plugin-path-traversal",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34032", "id": "CVE-2025-34032",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.350", "published": "2025-06-24T01:15:24.350",
"lastModified": "2025-06-24T01:15:24.350", "lastModified": "2025-06-24T03:15:32.987",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -75,7 +75,7 @@
], ],
"references": [ "references": [
{ {
"url": "https://vulncheck.com/advisories/moodle-lms-jmol-jsmol-plugin-xss", "url": "https://vulncheck.com/advisories/moodle-lms-jmol-plugin-xss",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34033", "id": "CVE-2025-34033",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.493", "published": "2025-06-24T01:15:24.493",
"lastModified": "2025-06-24T01:15:24.493", "lastModified": "2025-06-24T03:15:33.090",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -75,7 +75,7 @@
], ],
"references": [ "references": [
{ {
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials", "url": "https://vulncheck.com/advisories/5vtechnologies-blue-angel-command-injection",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34034", "id": "CVE-2025-34034",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.630", "published": "2025-06-24T01:15:24.630",
"lastModified": "2025-06-24T01:15:24.630", "lastModified": "2025-06-24T03:15:33.193",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -71,7 +71,7 @@
], ],
"references": [ "references": [
{ {
"url": "https://vulncheck.com/advisories/blue-angel-software-suite-command-injection-default-credentials", "url": "https://vulncheck.com/advisories/5vtechnologies-blue-angel-hardcoded-credentials",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34035", "id": "CVE-2025-34035",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:24.763", "published": "2025-06-24T01:15:24.763",
"lastModified": "2025-06-24T01:15:24.763", "lastModified": "2025-06-24T03:15:33.293",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -83,7 +83,7 @@
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {
"url": "https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service-command-injection", "url": "https://vulncheck.com/advisories/engenius-enshare-iot-gigabit-cloud-service",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-34037", "id": "CVE-2025-34037",
"sourceIdentifier": "disclosure@vulncheck.com", "sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T01:15:25.037", "published": "2025-06-24T01:15:25.037",
"lastModified": "2025-06-24T01:15:25.037", "lastModified": "2025-06-24T03:15:33.400",
"vulnStatus": "Received", "vulnStatus": "Received",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -79,7 +79,7 @@
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {
"url": "https://vulncheck.com/advisories/linksys-multiple-routers-command-injection", "url": "https://vulncheck.com/advisories/linksys-routers-command-injection",
"source": "disclosure@vulncheck.com" "source": "disclosure@vulncheck.com"
}, },
{ {

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34038",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T02:15:21.667",
"lastModified": "2025-06-24T03:15:33.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability exists in Fanwei e-cology 8.0 via the getdata.jsp endpoint. The application directly passes unsanitized user input from the sql parameter into a database query within the getSelectAllIds(sql, type) method, reachable through the cmd=getSelectAllId workflow in the AjaxManager. This allows unauthenticated attackers to execute arbitrary SQL queries, potentially exposing sensitive data such as administrator password hashes."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/fanwei-ecology-sql-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnblogs.com/0day-li/p/14637680.html",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-33202",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.weaver.com.cn/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34039",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T02:15:22.540",
"lastModified": "2025-06-24T02:15:22.540",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A code injection vulnerability exists in Yonyou UFIDA NC v6.5 and prior due to the exposure of the BeanShell testing servlet (bsh.servlet.BshServlet) without proper access controls. The servlet allows unauthenticated remote attackers to execute arbitrary Java code via the bsh.script parameter. This can be exploited to run system commands and ultimately gain full control over the target server. The issue is rooted in a third-party JAR component bundled with the application, and the servlet is accessible without authentication on vulnerable installations."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/yonyou-ufida-nc-beanshell-code-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnblogs.com/pursue-security/p/17685141.html",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-30167",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34040",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T02:15:22.673",
"lastModified": "2025-06-24T02:15:22.673",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An arbitrary file upload vulnerability exists in the Zhiyuan OA platform 5.0, 5.1 - 5.6sp1, 6.0 - 6.1sp2, 7.0, 7.0sp1 - 7.1, 7.1sp1, and 8.0 - 8.0sp2 via the wpsAssistServlet interface. The realFileType and fileId parameters are improperly validated during multipart file uploads, allowing unauthenticated attackers to upload crafted JSP files outside of intended directories using path traversal. Successful exploitation enables remote code execution as the uploaded file can be accessed and executed through the web server."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://service.seeyon.com/patchtools/tp.html#/patchList?type=%E5%AE%89%E5%85%A8%E8%A1%A5%E4%B8%81&id=1",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/zhiyuan-oa-system-path-traversal-file-upload",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnblogs.com/pursue-security/p/17677130.html",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-01627",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-34041",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-24T02:15:22.820",
"lastModified": "2025-06-24T02:15:22.820",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the Chinese versions of Sangfor Endpoint Detection and Response (EDR) management platform versions 3.2.16, 3.2.17, and 3.2.19. The vulnerability allows unauthenticated attackers to construct and send malicious HTTP requests to the EDR Manager interface, leading to arbitrary command execution with elevated privileges. This flaw only affects the Chinese-language EDR builds."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://vulncheck.com/advisories/sangfor-edr-command-injection",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2020-46552",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.sangfor.com/blog/cybersecurity/sangfor-endpoint-secure-remote-command-execution-vulnerability",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48461",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:33.613",
"lastModified": "2025-06-24T03:15:33.613",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to conduct brute force guessing and account takeover as the session cookies are predictable, potentially allowing the attackers to gain root, admin or user access and reset passwords."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.6,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48462",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:33.753",
"lastModified": "2025-06-24T03:15:33.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an attacker to consume all available session slots and block other users from logging in, thereby preventing legitimate users from gaining access to the product."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48463",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:33.870",
"lastModified": "2025-06-24T03:15:33.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an attacker to intercept data and conduct session hijacking on the exposed data as the vulnerable product uses unencrypted HTTP communication, potentially leading to unauthorised access or data tampering."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.1,
"baseSeverity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 1.4
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2025-48466",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.013",
"lastModified": "2025-06-24T03:15:34.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an unauthenticated, remote attacker to send Modbus TCP packets to manipulate Digital Outputs, potentially allowing remote control of relay channel which may lead to operational or safety risks."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"references": [
{
"url": "https://github.com/shipcod3/CVE-2025-48466",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
},
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48467",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.140",
"lastModified": "2025-06-24T03:15:34.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an attacker to cause repeated reboots, potentially leading to remote denial-of-service and system unavailability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48468",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.267",
"lastModified": "2025-06-24T03:15:34.267",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an attacker that has physical access to interface with JTAG to inject or modify firmware."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"attackVector": "PHYSICAL",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.5,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2025-48469",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.390",
"lastModified": "2025-06-24T03:15:34.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the vulnerability could allow an unauthenticated attacker to upload firmware through a public update page, potentially leading to backdoor installation or privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://jro.sg/CVEs/CVE-2025-48469/",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
},
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061/",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-48470",
"sourceIdentifier": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"published": "2025-06-24T03:15:34.523",
"lastModified": "2025-06-24T03:15:34.523",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Successful exploitation of the stored cross-site scripting vulnerability could allow an attacker to inject malicious scripts into device fields and executed in other users\u2019 browser, potentially leading to session hijacking, defacement, credential theft, or privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L",
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"attackVector": "ADJACENT_NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.7,
"impactScore": 3.4
}
]
},
"references": [
{
"url": "https://www.csa.gov.sg/alerts-and-advisories/alerts/al-2025-061",
"source": "5f57b9bf-260d-4433-bf07-b6a79e9bb7d4"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-52560",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-24T03:15:34.653",
"lastModified": "2025-06-24T03:15:34.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Kanboard is project management software that focuses on the Kanban methodology. Prior to version 1.2.46, Kanboard allows password reset emails to be sent with URLs derived from the unvalidated Host header when the application_url configuration is unset (default behavior). This allows an attacker to craft a malicious password reset link that leaks the token to an attacker-controlled domain. If a victim (including an administrator) clicks the poisoned link, their account can be taken over. This affects all users who initiate a password reset while application_url is not set. This issue has been patched in version 1.2.46."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-640"
}
]
}
],
"references": [
{
"url": "https://github.com/kanboard/kanboard/commit/bca2bd7ab95e7990e358fd35a7daf51a9c16aa75",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/kanboard/kanboard/security/advisories/GHSA-2ch5-gqjm-8p92",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-52574",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-24T03:15:34.797",
"lastModified": "2025-06-24T03:15:34.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SysmonElixir is a system monitor HTTP service in Elixir. Prior to version 1.0.1, the /read endpoint reads any file from the server's /etc/passwd by default. In v1.0.1, a whitelist was added that limits reading to only files under priv/data. This issue has been patched in version 1.0.1."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/bocaletto-luca/elixir-system-monitor/commit/647a5525f6667a28f1133985213dd080ea11bb87",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/bocaletto-luca/elixir-system-monitor/security/advisories/GHSA-9vj4-rv7q-36qj",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52971",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:34.947",
"lastModified": "2025-06-24T03:15:34.947",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52972",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.027",
"lastModified": "2025-06-24T03:15:35.027",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52973",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.090",
"lastModified": "2025-06-24T03:15:35.090",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52974",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.147",
"lastModified": "2025-06-24T03:15:35.147",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52975",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.210",
"lastModified": "2025-06-24T03:15:35.210",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52976",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.270",
"lastModified": "2025-06-24T03:15:35.270",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52977",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.333",
"lastModified": "2025-06-24T03:15:35.333",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52978",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.393",
"lastModified": "2025-06-24T03:15:35.393",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2025-52979",
"sourceIdentifier": "psirt@fortinet.com",
"published": "2025-06-24T03:15:35.453",
"lastModified": "2025-06-24T03:15:35.453",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: Not used"
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6536",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T02:15:22.967",
"lastModified": "2025-06-24T02:15:22.967",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in Tarantool up to 3.3.1 and classified as problematic. Affected by this vulnerability is the function tm_to_datetime in the library src/lib/core/datetime.c. The manipulation leads to reachable assertion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-617"
}
]
}
],
"references": [
{
"url": "https://github.com/tarantool/tarantool/issues/11347",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/19613858/tarantool_crash.txt",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313663",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313663",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597454",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6551",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T02:15:23.170",
"lastModified": "2025-06-24T02:15:23.170",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in java-aodeng Hope-Boot 1.0.0 and classified as problematic. This issue affects the function Login of the file /src/main/java/com/hope/controller/WebController.java. The manipulation of the argument errorMsg leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-01/report.md#steps-to-reproduce",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313691",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313691",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596615",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6552",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-24T03:15:35.520",
"lastModified": "2025-06-24T03:15:35.520",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in java-aodeng Hope-Boot 1.0.0. It has been classified as problematic. Affected is the function doLogin of the file /src/main/java/com/hope/controller/WebController.java of the component Login. The manipulation of the argument redirect_url leads to open redirect. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250613-02.md#steps-to-reproduce",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313692",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313692",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596681",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,111 @@
{
"id": "CVE-2025-6559",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-06-24T03:15:35.700",
"lastModified": "2025-06-24T03:15:35.700",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple wireless router models from Sapido have an OS Command Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary OS commands and execute them on the server.\u00a0The affected models are out of support; replacing the device is recommended."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-10195-69da1-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-10196-898d3-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -0,0 +1,111 @@
{
"id": "CVE-2025-6560",
"sourceIdentifier": "twcert@cert.org.tw",
"published": "2025-06-24T03:15:35.897",
"lastModified": "2025-06-24T03:15:35.897",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "twcert@cert.org.tw",
"tags": [
"unsupported-when-assigned"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Multiple wireless router models from Sapido have an Exposure of Sensitive Information vulnerability, allowing unauthenticated remote attackers to directly access a system configuration file and obtain plaintext administrator credentials.\u00a0\n\nThe affected models are out of support; replacing the device is recommended."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "twcert@cert.org.tw",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "twcert@cert.org.tw",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-256"
}
]
}
],
"references": [
{
"url": "https://www.twcert.org.tw/en/cp-139-10198-55217-2.html",
"source": "twcert@cert.org.tw"
},
{
"url": "https://www.twcert.org.tw/tw/cp-132-10197-524ea-1.html",
"source": "twcert@cert.org.tw"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-06-24T02:00:19.482773+00:00 2025-06-24T04:00:33.568536+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-06-24T01:35:34.217000+00:00 2025-06-24T03:15:35.897000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,56 +33,50 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
299140 299168
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `12` Recently added CVEs: `28`
- [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-24T01:15:23.340`) - [CVE-2025-34041](CVE-2025/CVE-2025-340xx/CVE-2025-34041.json) (`2025-06-24T02:15:22.820`)
- [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-24T01:15:24.350`) - [CVE-2025-48461](CVE-2025/CVE-2025-484xx/CVE-2025-48461.json) (`2025-06-24T03:15:33.613`)
- [CVE-2025-34033](CVE-2025/CVE-2025-340xx/CVE-2025-34033.json) (`2025-06-24T01:15:24.493`) - [CVE-2025-48462](CVE-2025/CVE-2025-484xx/CVE-2025-48462.json) (`2025-06-24T03:15:33.753`)
- [CVE-2025-34034](CVE-2025/CVE-2025-340xx/CVE-2025-34034.json) (`2025-06-24T01:15:24.630`) - [CVE-2025-48463](CVE-2025/CVE-2025-484xx/CVE-2025-48463.json) (`2025-06-24T03:15:33.870`)
- [CVE-2025-34035](CVE-2025/CVE-2025-340xx/CVE-2025-34035.json) (`2025-06-24T01:15:24.763`) - [CVE-2025-48466](CVE-2025/CVE-2025-484xx/CVE-2025-48466.json) (`2025-06-24T03:15:34.013`)
- [CVE-2025-34036](CVE-2025/CVE-2025-340xx/CVE-2025-34036.json) (`2025-06-24T01:15:24.903`) - [CVE-2025-48467](CVE-2025/CVE-2025-484xx/CVE-2025-48467.json) (`2025-06-24T03:15:34.140`)
- [CVE-2025-34037](CVE-2025/CVE-2025-340xx/CVE-2025-34037.json) (`2025-06-24T01:15:25.037`) - [CVE-2025-48468](CVE-2025/CVE-2025-484xx/CVE-2025-48468.json) (`2025-06-24T03:15:34.267`)
- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-24T00:15:25.917`) - [CVE-2025-48469](CVE-2025/CVE-2025-484xx/CVE-2025-48469.json) (`2025-06-24T03:15:34.390`)
- [CVE-2025-6532](CVE-2025/CVE-2025-65xx/CVE-2025-6532.json) (`2025-06-24T00:15:26.213`) - [CVE-2025-48470](CVE-2025/CVE-2025-484xx/CVE-2025-48470.json) (`2025-06-24T03:15:34.523`)
- [CVE-2025-6533](CVE-2025/CVE-2025-65xx/CVE-2025-6533.json) (`2025-06-24T00:15:26.397`) - [CVE-2025-52560](CVE-2025/CVE-2025-525xx/CVE-2025-52560.json) (`2025-06-24T03:15:34.653`)
- [CVE-2025-6534](CVE-2025/CVE-2025-65xx/CVE-2025-6534.json) (`2025-06-24T01:15:25.303`) - [CVE-2025-52574](CVE-2025/CVE-2025-525xx/CVE-2025-52574.json) (`2025-06-24T03:15:34.797`)
- [CVE-2025-6535](CVE-2025/CVE-2025-65xx/CVE-2025-6535.json) (`2025-06-24T01:15:25.513`) - [CVE-2025-52971](CVE-2025/CVE-2025-529xx/CVE-2025-52971.json) (`2025-06-24T03:15:34.947`)
- [CVE-2025-52972](CVE-2025/CVE-2025-529xx/CVE-2025-52972.json) (`2025-06-24T03:15:35.027`)
- [CVE-2025-52973](CVE-2025/CVE-2025-529xx/CVE-2025-52973.json) (`2025-06-24T03:15:35.090`)
- [CVE-2025-52974](CVE-2025/CVE-2025-529xx/CVE-2025-52974.json) (`2025-06-24T03:15:35.147`)
- [CVE-2025-52975](CVE-2025/CVE-2025-529xx/CVE-2025-52975.json) (`2025-06-24T03:15:35.210`)
- [CVE-2025-52976](CVE-2025/CVE-2025-529xx/CVE-2025-52976.json) (`2025-06-24T03:15:35.270`)
- [CVE-2025-52977](CVE-2025/CVE-2025-529xx/CVE-2025-52977.json) (`2025-06-24T03:15:35.333`)
- [CVE-2025-52978](CVE-2025/CVE-2025-529xx/CVE-2025-52978.json) (`2025-06-24T03:15:35.393`)
- [CVE-2025-52979](CVE-2025/CVE-2025-529xx/CVE-2025-52979.json) (`2025-06-24T03:15:35.453`)
- [CVE-2025-6536](CVE-2025/CVE-2025-65xx/CVE-2025-6536.json) (`2025-06-24T02:15:22.967`)
- [CVE-2025-6551](CVE-2025/CVE-2025-65xx/CVE-2025-6551.json) (`2025-06-24T02:15:23.170`)
- [CVE-2025-6552](CVE-2025/CVE-2025-65xx/CVE-2025-6552.json) (`2025-06-24T03:15:35.520`)
- [CVE-2025-6559](CVE-2025/CVE-2025-65xx/CVE-2025-6559.json) (`2025-06-24T03:15:35.700`)
- [CVE-2025-6560](CVE-2025/CVE-2025-65xx/CVE-2025-6560.json) (`2025-06-24T03:15:35.897`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `29` Recently modified CVEs: `6`
- [CVE-2024-40113](CVE-2024/CVE-2024-401xx/CVE-2024-40113.json) (`2025-06-24T01:00:53.330`) - [CVE-2025-34031](CVE-2025/CVE-2025-340xx/CVE-2025-34031.json) (`2025-06-24T03:15:32.860`)
- [CVE-2024-40114](CVE-2024/CVE-2024-401xx/CVE-2024-40114.json) (`2025-06-24T00:59:48.440`) - [CVE-2025-34032](CVE-2025/CVE-2025-340xx/CVE-2025-34032.json) (`2025-06-24T03:15:32.987`)
- [CVE-2024-40494](CVE-2024/CVE-2024-404xx/CVE-2024-40494.json) (`2025-06-24T01:11:48.770`) - [CVE-2025-34033](CVE-2025/CVE-2025-340xx/CVE-2025-34033.json) (`2025-06-24T03:15:33.090`)
- [CVE-2024-41712](CVE-2024/CVE-2024-417xx/CVE-2024-41712.json) (`2025-06-24T01:30:56.780`) - [CVE-2025-34034](CVE-2025/CVE-2025-340xx/CVE-2025-34034.json) (`2025-06-24T03:15:33.193`)
- [CVE-2024-41714](CVE-2024/CVE-2024-417xx/CVE-2024-41714.json) (`2025-06-24T01:29:55.607`) - [CVE-2025-34035](CVE-2025/CVE-2025-340xx/CVE-2025-34035.json) (`2025-06-24T03:15:33.293`)
- [CVE-2024-46478](CVE-2024/CVE-2024-464xx/CVE-2024-46478.json) (`2025-06-24T01:09:04.613`) - [CVE-2025-34037](CVE-2025/CVE-2025-340xx/CVE-2025-34037.json) (`2025-06-24T03:15:33.400`)
- [CVE-2024-47224](CVE-2024/CVE-2024-472xx/CVE-2024-47224.json) (`2025-06-24T01:21:34.700`)
- [CVE-2024-50658](CVE-2024/CVE-2024-506xx/CVE-2024-50658.json) (`2025-06-24T00:17:53.820`)
- [CVE-2024-50931](CVE-2024/CVE-2024-509xx/CVE-2024-50931.json) (`2025-06-24T00:38:36.073`)
- [CVE-2024-51165](CVE-2024/CVE-2024-511xx/CVE-2024-51165.json) (`2025-06-24T00:37:18.360`)
- [CVE-2024-55008](CVE-2024/CVE-2024-550xx/CVE-2024-55008.json) (`2025-06-24T00:19:17.740`)
- [CVE-2024-55089](CVE-2024/CVE-2024-550xx/CVE-2024-55089.json) (`2025-06-24T00:32:09.147`)
- [CVE-2024-56737](CVE-2024/CVE-2024-567xx/CVE-2024-56737.json) (`2025-06-24T00:30:45.817`)
- [CVE-2024-56738](CVE-2024/CVE-2024-567xx/CVE-2024-56738.json) (`2025-06-24T00:29:03.183`)
- [CVE-2024-57427](CVE-2024/CVE-2024-574xx/CVE-2024-57427.json) (`2025-06-24T00:13:56.393`)
- [CVE-2024-57428](CVE-2024/CVE-2024-574xx/CVE-2024-57428.json) (`2025-06-24T00:13:30.770`)
- [CVE-2024-57429](CVE-2024/CVE-2024-574xx/CVE-2024-57429.json) (`2025-06-24T00:13:05.303`)
- [CVE-2024-57430](CVE-2024/CVE-2024-574xx/CVE-2024-57430.json) (`2025-06-24T00:12:38.623`)
- [CVE-2025-26136](CVE-2025/CVE-2025-261xx/CVE-2025-26136.json) (`2025-06-24T00:54:20.497`)
- [CVE-2025-26319](CVE-2025/CVE-2025-263xx/CVE-2025-26319.json) (`2025-06-24T00:50:39.497`)
- [CVE-2025-27622](CVE-2025/CVE-2025-276xx/CVE-2025-27622.json) (`2025-06-24T00:48:40.867`)
- [CVE-2025-27623](CVE-2025/CVE-2025-276xx/CVE-2025-27623.json) (`2025-06-24T00:46:38.817`)
- [CVE-2025-27624](CVE-2025/CVE-2025-276xx/CVE-2025-27624.json) (`2025-06-24T00:45:20.613`)
- [CVE-2025-27625](CVE-2025/CVE-2025-276xx/CVE-2025-27625.json) (`2025-06-24T00:42:16.010`)
- [CVE-2025-5777](CVE-2025/CVE-2025-57xx/CVE-2025-5777.json) (`2025-06-24T01:15:25.177`)
## Download and Usage ## Download and Usage

View File

@ -158180,7 +158180,7 @@ CVE-2020-3428,0,0,1d203dfb64afc88635ecdea956d4e399018ec66b0845e3a3c519582ad91af9
CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000 CVE-2020-3429,0,0,101e53f438fdaab4d8036c36641c0ed4e00559faf42044f1ad2ece55c0b4650a,2024-11-21T05:31:03.167000
CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000 CVE-2020-3430,0,0,98eeb5229dfeae10e40545efe1765338b1e8931dcbdcc810929adf0530704da8,2024-11-21T05:31:03.293000
CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000 CVE-2020-3431,0,0,cd6d3bac32cfd8857a644f1078f419fb235151f316f0943be1e4e9e1b0583c53,2024-11-18T17:11:17.393000
CVE-2020-3432,0,1,7b9dd4847d8e685f84ed811f15fe603d796ba0d6dc9eb217158a5ab61aef0fd6,2025-06-24T00:12:09.860000 CVE-2020-3432,0,0,7b9dd4847d8e685f84ed811f15fe603d796ba0d6dc9eb217158a5ab61aef0fd6,2025-06-24T00:12:09.860000
CVE-2020-3433,0,0,2c85045431b9488c2e1c1014ac599de02c76a7bc319f5ca94e1cd53433e20ccb,2025-02-24T15:40:28.853000 CVE-2020-3433,0,0,2c85045431b9488c2e1c1014ac599de02c76a7bc319f5ca94e1cd53433e20ccb,2025-02-24T15:40:28.853000
CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000 CVE-2020-3434,0,0,c8995b33bcde31c655667c0230d7d58e1c0dd14cc20aaace02cd27edf751de36,2024-11-21T05:31:03.617000
CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000 CVE-2020-3435,0,0,42896a56717af6cb678dbb4889e2a239138d23b959eef5d7c82a355eef30417a,2024-11-21T05:31:03.753000
@ -246590,7 +246590,7 @@ CVE-2024-11180,0,0,cdec5a9c38ec7cebf1f7443845585c3611f8e72d34f49cbe56c66f786a235
CVE-2024-11181,0,0,a4dfe2e9b1369646dd874247071d27c45ff304ea068bd5a32b412f0bd0fabfa7,2025-06-05T15:59:04.970000 CVE-2024-11181,0,0,a4dfe2e9b1369646dd874247071d27c45ff304ea068bd5a32b412f0bd0fabfa7,2025-06-05T15:59:04.970000
CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000 CVE-2024-11182,0,0,fcbf84d76bd0ec5a6be96e0f2f3367a28021db9502432aff67df27ded6f18f2e,2025-05-21T18:44:12.623000
CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000 CVE-2024-11183,0,0,38a79fdf028e6d076b0c9ce59b96b7c75f295dd059f7e0b8602ad289d643763d,2025-05-06T21:25:00.510000
CVE-2024-11184,0,1,5e0f3b1fcccf830b61b8807e8c6ade803178071eac4fdff84f6bc889bc3ded1a,2025-06-24T00:21:37.557000 CVE-2024-11184,0,0,5e0f3b1fcccf830b61b8807e8c6ade803178071eac4fdff84f6bc889bc3ded1a,2025-06-24T00:21:37.557000
CVE-2024-11185,0,0,1932fde8da4ceff0aad2c8c397b6223b173c5e24bf16e388d91260742a2a8c8f,2025-05-28T15:01:30.720000 CVE-2024-11185,0,0,1932fde8da4ceff0aad2c8c397b6223b173c5e24bf16e388d91260742a2a8c8f,2025-05-28T15:01:30.720000
CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000 CVE-2024-11186,0,0,47033ebf7daa317b6456f1e8ce85d004bf0340e8f8ca88292af77e0280797b52,2025-05-12T17:32:52.810000
CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000 CVE-2024-11187,0,0,e4a5fa8a1c9ef1119fc9f2584e4a2ef956ae93ae1074bec0b84b51f9ed0675ab,2025-02-11T19:15:12.640000
@ -256881,7 +256881,7 @@ CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f5
CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000 CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000
CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000 CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000
CVE-2024-28714,0,0,2016e8accbb7084f74d0c24ce4b81c6735174694ae204335fd0b22c9533ecf84,2025-06-10T00:54:10.907000 CVE-2024-28714,0,0,2016e8accbb7084f74d0c24ce4b81c6735174694ae204335fd0b22c9533ecf84,2025-06-10T00:54:10.907000
CVE-2024-28715,0,1,ab720d17e0d86e1593c42e240ca075220478c0940b7fabd2dded908a3ff2bc27,2025-06-24T01:35:34.217000 CVE-2024-28715,0,0,ab720d17e0d86e1593c42e240ca075220478c0940b7fabd2dded908a3ff2bc27,2025-06-24T01:35:34.217000
CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000 CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000
CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000 CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000
CVE-2024-28718,0,0,3096999cb272c6431967462199f78848dfa9cb1ba9fb353933e95c4783c90e4b,2025-06-17T21:00:54.593000 CVE-2024-28718,0,0,3096999cb272c6431967462199f78848dfa9cb1ba9fb353933e95c4783c90e4b,2025-06-17T21:00:54.593000
@ -258655,7 +258655,7 @@ CVE-2024-31013,0,0,c8b08beaa05aa5eafe964510521b6e1a3b6ffa974e1c46ebca30a5ea5eebf
CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000 CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000
CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000 CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000
CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000 CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000
CVE-2024-31029,0,1,0ad84b017b6a8c0527e0ed95395dc7b2a26c66fc7b27003012e640ff9bc2c168,2025-06-24T01:13:44.843000 CVE-2024-31029,0,0,0ad84b017b6a8c0527e0ed95395dc7b2a26c66fc7b27003012e640ff9bc2c168,2025-06-24T01:13:44.843000
CVE-2024-3103,0,0,7fb83952d934c1ed84cba523651fd78d88e84c01517f86d3d43c873d9254ed5e,2025-02-11T02:15:34.540000 CVE-2024-3103,0,0,7fb83952d934c1ed84cba523651fd78d88e84c01517f86d3d43c873d9254ed5e,2025-02-11T02:15:34.540000
CVE-2024-31030,0,0,0899af33ddc85c61766a5d983aabfa57cd7e5edc2db4db31a6f0c031431e3012,2024-11-21T09:12:44.697000 CVE-2024-31030,0,0,0899af33ddc85c61766a5d983aabfa57cd7e5edc2db4db31a6f0c031431e3012,2024-11-21T09:12:44.697000
CVE-2024-31031,0,0,98b230fd7cf6eeeefd08aaf7e96cb284e87853697db416e7d61ba5fd0934a026,2025-06-18T19:40:24.270000 CVE-2024-31031,0,0,98b230fd7cf6eeeefd08aaf7e96cb284e87853697db416e7d61ba5fd0934a026,2025-06-18T19:40:24.270000
@ -265887,8 +265887,8 @@ CVE-2024-4011,0,0,023a65dd1f5eb72b47a28389dd0798106b90c6451db9a08d936ec1bf45bba7
CVE-2024-40110,0,0,7977104a17d98c8ed6f9bcceda6dc05f4e647c9fc83bc6f905a0f6c4f3a00efd,2025-04-23T14:19:36.130000 CVE-2024-40110,0,0,7977104a17d98c8ed6f9bcceda6dc05f4e647c9fc83bc6f905a0f6c4f3a00efd,2025-04-23T14:19:36.130000
CVE-2024-40111,0,0,35b0050b7d8d9045b9cae343cd8e95f47419f422608243682c7eeeadc6be1b0f,2025-04-21T14:38:21.703000 CVE-2024-40111,0,0,35b0050b7d8d9045b9cae343cd8e95f47419f422608243682c7eeeadc6be1b0f,2025-04-21T14:38:21.703000
CVE-2024-40112,0,0,9bd607e73ee88fab8d46057c2aa6063bb553d5003fa47439a632f9a6a40da816,2025-06-02T19:15:25.003000 CVE-2024-40112,0,0,9bd607e73ee88fab8d46057c2aa6063bb553d5003fa47439a632f9a6a40da816,2025-06-02T19:15:25.003000
CVE-2024-40113,0,1,35937a6fb996a4bf5f74aedd3c102f3a45ca4145b975dc7fc398488b3b9fce7e,2025-06-24T01:00:53.330000 CVE-2024-40113,0,0,35937a6fb996a4bf5f74aedd3c102f3a45ca4145b975dc7fc398488b3b9fce7e,2025-06-24T01:00:53.330000
CVE-2024-40114,0,1,e08ecdbbc683b7115924e32d1c960fce483393c42b5312dfc045964ea8ac9b2f,2025-06-24T00:59:48.440000 CVE-2024-40114,0,0,e08ecdbbc683b7115924e32d1c960fce483393c42b5312dfc045964ea8ac9b2f,2025-06-24T00:59:48.440000
CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670222,2025-03-26T16:15:20.330000 CVE-2024-40116,0,0,19134811427fbe9dee5753b9d0c099a969fd07ce07ff2e8eb545bbcd0f670222,2025-03-26T16:15:20.330000
CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000 CVE-2024-40117,0,0,2a65d8ca9f0e21ab04eb67f5b55ddbb907f00fc8747a1174398adffad7e2c4b6,2024-11-21T09:30:57.700000
CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000 CVE-2024-40119,0,0,350b537a9703bb479d3aeed53ee034530a7a303e34e5836f5efa11a1efa4ddeb,2024-11-21T09:30:57.907000
@ -266003,7 +266003,7 @@ CVE-2024-40488,0,0,ad22cf5d2ab3c9ffc78f1597bec32960e2b4fbdd5e0d003a7a7a0e08f406b
CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000 CVE-2024-40490,0,0,dff45e8b937b0d43e514699f6678cc1eb9310868386eff11863fd2135561092a,2024-11-04T21:35:05.530000
CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000 CVE-2024-40492,0,0,15d7a965787ba65f0b0c3a9bed6ce34898e8762185902bff45ae0d0229ab4c68,2024-11-21T09:31:10.977000
CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000 CVE-2024-40493,0,0,d8cc68a495620dcb2d28bb34338d4bad4b040e899e98ffb2db4c475330153317,2024-10-25T17:01:22.433000
CVE-2024-40494,0,1,8f23025815b1e2f4780baf03b62bd886460c2c4b50385e825eef67659a86f249,2025-06-24T01:11:48.770000 CVE-2024-40494,0,0,8f23025815b1e2f4780baf03b62bd886460c2c4b50385e825eef67659a86f249,2025-06-24T01:11:48.770000
CVE-2024-40495,0,0,1c9732481c995a3ecead089b39a64e9ee5c85132819c111045be77c58b37253c,2025-03-13T14:15:30.270000 CVE-2024-40495,0,0,1c9732481c995a3ecead089b39a64e9ee5c85132819c111045be77c58b37253c,2025-03-13T14:15:30.270000
CVE-2024-40498,0,0,87dac0a04dde5c7b7d6e4bba8f975c746a26b85fad012a6c4a30536ac112c101,2024-08-06T16:30:24.547000 CVE-2024-40498,0,0,87dac0a04dde5c7b7d6e4bba8f975c746a26b85fad012a6c4a30536ac112c101,2024-08-06T16:30:24.547000
CVE-2024-40500,0,0,6ef0dec3732dba29c28c16bc6e8be9cd17ef4cef498f58a8c690fd37b8dddb98,2024-08-21T16:05:32.603000 CVE-2024-40500,0,0,6ef0dec3732dba29c28c16bc6e8be9cd17ef4cef498f58a8c690fd37b8dddb98,2024-08-21T16:05:32.603000
@ -266921,9 +266921,9 @@ CVE-2024-41709,0,0,2b9faa9660224ef04837ccdfcafb9813d06bd10cec2927cfd9c0ac07e7430
CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000 CVE-2024-4171,0,0,1f56b05b395cd02714b648c07b8a801ca2a6b7d7ba94332e3b402d08208eafaa,2024-11-21T09:42:19.650000
CVE-2024-41710,0,0,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000 CVE-2024-41710,0,0,9267f1b46e0a1abbcc0d8f7597fd616fe6977c1655e4d69e577e24771a10864e,2025-02-18T15:28:00.123000
CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000 CVE-2024-41711,0,0,68dd962f9a2631075d76b0f5dc2808ef613409420c9c9f99aeacaa5e6120b709,2024-08-14T16:35:15.033000
CVE-2024-41712,0,1,d73c1d27bc50b61ff3b541a55b3e4da47196afc07f0f441c3742538898de0b6a,2025-06-24T01:30:56.780000 CVE-2024-41712,0,0,d73c1d27bc50b61ff3b541a55b3e4da47196afc07f0f441c3742538898de0b6a,2025-06-24T01:30:56.780000
CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000 CVE-2024-41713,0,0,3487c8ff851c3a481ae23b368979a3242ff57f7c48f30db291ef2ed6aefdd218,2025-01-08T20:31:25.237000
CVE-2024-41714,0,1,83d4ce9e6d2ccd00c3dad3ff839a320f093b18515266d45961ec3e2e3216f7c7,2025-06-24T01:29:55.607000 CVE-2024-41714,0,0,83d4ce9e6d2ccd00c3dad3ff839a320f093b18515266d45961ec3e2e3216f7c7,2025-06-24T01:29:55.607000
CVE-2024-41715,0,0,55a3928b1510ffef142699cda3e2cd76f227f18a2c54b340de368b98196250b2,2024-10-17T17:15:11.530000 CVE-2024-41715,0,0,55a3928b1510ffef142699cda3e2cd76f227f18a2c54b340de368b98196250b2,2024-10-17T17:15:11.530000
CVE-2024-41716,0,0,c449ec87df6d90ba0adfc5fd5f3a85f5f0cc0ce39dc439223fd923327707f9d8,2025-03-13T15:15:47.003000 CVE-2024-41716,0,0,c449ec87df6d90ba0adfc5fd5f3a85f5f0cc0ce39dc439223fd923327707f9d8,2025-03-13T15:15:47.003000
CVE-2024-41717,0,0,c9f80448cdc976f3002da313ea63287cd63a05c44fc79274549925f22ad726a5,2024-10-23T15:12:34.673000 CVE-2024-41717,0,0,c9f80448cdc976f3002da313ea63287cd63a05c44fc79274549925f22ad726a5,2024-10-23T15:12:34.673000
@ -270513,7 +270513,7 @@ CVE-2024-46470,0,0,ccd900df91568f37aaaf8beaddb896f7b1bf9ff01c6bf3d8989063329ed3c
CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000 CVE-2024-46471,0,0,95b680df6f7ac557262e9483a5a0b48e0997cd8bfadfc2bd86c9ad1edd8cade7,2025-03-31T19:07:09.867000
CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000 CVE-2024-46472,0,0,98034addb2dd3db31543176eec90b3d6be943e239cb4afda9c52b024f5b4c496,2025-03-31T19:02:48.263000
CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000 CVE-2024-46475,0,0,8de337bf21f8e76ccf4e6b762e2c811bd622fb2d069c67372f969f963e9a513d,2024-10-04T13:51:25.567000
CVE-2024-46478,0,1,a257cefeeec0265594923947771175b9150a1daf6cc6efda8e93fb88b3f715e2,2025-06-24T01:09:04.613000 CVE-2024-46478,0,0,a257cefeeec0265594923947771175b9150a1daf6cc6efda8e93fb88b3f715e2,2025-06-24T01:09:04.613000
CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000 CVE-2024-46479,0,0,d3dcd1fb5238b07184a4925343df44d4e6e159f370a4f241b86afa356047b5d1,2025-01-13T18:15:18.003000
CVE-2024-4648,0,0,a64bb421321ecf5edddde289247f2be9eb6d00e91a0d8a91994337a2d7ef771c,2025-02-19T18:04:02.307000 CVE-2024-4648,0,0,a64bb421321ecf5edddde289247f2be9eb6d00e91a0d8a91994337a2d7ef771c,2025-02-19T18:04:02.307000
CVE-2024-46480,0,0,ff7dc1722880813d8ff3e28d1dccf547b3a865b2546150ea45115323f8573725,2025-01-13T20:15:28.147000 CVE-2024-46480,0,0,ff7dc1722880813d8ff3e28d1dccf547b3a865b2546150ea45115323f8573725,2025-01-13T20:15:28.147000
@ -271167,7 +271167,7 @@ CVE-2024-47220,0,0,f3ac3c597af9e4605453ec7e5003d51d9fc5b1c12997e286134131bb5771e
CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af0ed,2025-03-19T16:15:28.600000 CVE-2024-47221,0,0,ad5f394b892b60bbd00529ce857218f4587aca66ed7d172df87e3d22b51af0ed,2025-03-19T16:15:28.600000
CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000 CVE-2024-47222,0,0,af35ec2b090f518b0dacc1cf6ad59f97af77926ea86cca3bbe8fde63fb5bf8c9,2025-03-18T21:15:30.377000
CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000 CVE-2024-47223,0,0,793e25c409356d9e47267c562ba592bb3512ca8ad2a6d2411ca48d0873dfd90f,2024-10-23T15:12:34.673000
CVE-2024-47224,0,1,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000 CVE-2024-47224,0,0,d6e19c7b2d0feea5eb398cf6834597817b31f7f19c80ef01ddc9f10df502e488,2025-06-24T01:21:34.700000
CVE-2024-47226,0,0,0c9114a6d7b06793fb4df4318fa93c3350cc9dd0329f9a1b32db743ff9d392dd,2025-02-10T22:15:35.383000 CVE-2024-47226,0,0,0c9114a6d7b06793fb4df4318fa93c3350cc9dd0329f9a1b32db743ff9d392dd,2025-02-10T22:15:35.383000
CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000 CVE-2024-47227,0,0,12cb3d637a00166b3cfe0c18fb70b19ea080bd614b4771496d6beb1981a88cc4,2025-03-25T15:15:22.737000
CVE-2024-4723,0,0,181284b6c997036a8e9487f6d01498e20f407a2bf8f4592e413d9384c6be6c62,2025-02-19T18:33:16.710000 CVE-2024-4723,0,0,181284b6c997036a8e9487f6d01498e20f407a2bf8f4592e413d9384c6be6c62,2025-02-19T18:33:16.710000
@ -273930,7 +273930,7 @@ CVE-2024-50654,0,0,5fcda88001562dfee1e6cc60fc3a7e9ed1e6a24d11c939faa9c604dfe739c
CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000 CVE-2024-50655,0,0,1459d7257280aa2e8bdcb66b80527b54cff1ac83583af5c95b1d9f4626d5dfc0,2024-11-21T09:44:54.133000
CVE-2024-50656,0,0,f0a8a495a13d600435eacdcf0244ff9923ebaa5af09d757b30ef2869e7ea9da5,2025-03-19T18:15:23.200000 CVE-2024-50656,0,0,f0a8a495a13d600435eacdcf0244ff9923ebaa5af09d757b30ef2869e7ea9da5,2025-03-19T18:15:23.200000
CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000 CVE-2024-50657,0,0,30b2eb884e7e45c72e97be70bee207473abaa297a2a95565537ba3cd89d0a4dd,2024-11-27T17:15:12.323000
CVE-2024-50658,0,1,7898e3f499416d584f6e62496c9f05779ea02eff42dcb5c945e2c7146f377e87,2025-06-24T00:17:53.820000 CVE-2024-50658,0,0,7898e3f499416d584f6e62496c9f05779ea02eff42dcb5c945e2c7146f377e87,2025-06-24T00:17:53.820000
CVE-2024-50659,0,0,149f06eac12099089379c01d894271cfdbe8590201e97c4a87009d93de3236e3,2025-01-08T16:15:34.597000 CVE-2024-50659,0,0,149f06eac12099089379c01d894271cfdbe8590201e97c4a87009d93de3236e3,2025-01-08T16:15:34.597000
CVE-2024-5066,0,0,da20a36df4ae005c3f3c1411b8e32bd9eb2b4f19552801b4eb562d04f97b3f8c,2025-03-03T16:13:18.990000 CVE-2024-5066,0,0,da20a36df4ae005c3f3c1411b8e32bd9eb2b4f19552801b4eb562d04f97b3f8c,2025-03-03T16:13:18.990000
CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000 CVE-2024-50660,0,0,f71f8e7c2fcb36b53cf871d625509d1de985a324b433af36346565606f116252,2025-01-08T16:15:34.817000
@ -274041,7 +274041,7 @@ CVE-2024-50928,0,0,ada67f2fe353aa1b7ced6a9deb8a0c7b6223eab28709c3283d81f0a7c20ec
CVE-2024-50929,0,0,834efd5e551720df1eaed9299c86c084dd2e69f9c40050772dafa31cc6ddac9b,2024-12-11T16:15:13.113000 CVE-2024-50929,0,0,834efd5e551720df1eaed9299c86c084dd2e69f9c40050772dafa31cc6ddac9b,2024-12-11T16:15:13.113000
CVE-2024-5093,0,0,3381b2d75db326726a4e09211cacf9703517f305d39e11cd5f4617ce5f18de83,2025-02-10T14:39:43.950000 CVE-2024-5093,0,0,3381b2d75db326726a4e09211cacf9703517f305d39e11cd5f4617ce5f18de83,2025-02-10T14:39:43.950000
CVE-2024-50930,0,0,6d6b0bf05a5beb39024fe11b26d3f363e871c0c6f62f0c287cbea52175dc4b00,2024-12-12T02:06:39.577000 CVE-2024-50930,0,0,6d6b0bf05a5beb39024fe11b26d3f363e871c0c6f62f0c287cbea52175dc4b00,2024-12-12T02:06:39.577000
CVE-2024-50931,0,1,e965ba7ff96dda263709d693f968de237be21440732e2511f6394ef82bd3612e,2025-06-24T00:38:36.073000 CVE-2024-50931,0,0,e965ba7ff96dda263709d693f968de237be21440732e2511f6394ef82bd3612e,2025-06-24T00:38:36.073000
CVE-2024-5094,0,0,c4bf8f3b10d77fb6e41e4a8adff10e5a5809b9d01a240dbe491d9e10a6476b88,2025-02-10T14:40:20.827000 CVE-2024-5094,0,0,c4bf8f3b10d77fb6e41e4a8adff10e5a5809b9d01a240dbe491d9e10a6476b88,2025-02-10T14:40:20.827000
CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000 CVE-2024-50942,0,0,74bb27dcec6f641721fef2704da713b75046095ccb8aeb2b392b8ef1abb8cd71,2024-12-04T17:15:15.020000
CVE-2024-50944,0,0,b076fd8f2f10d50911c6afe5f96c302ad9e2ba9d556044ae62121186adbd1b23,2024-12-28T19:15:06.197000 CVE-2024-50944,0,0,b076fd8f2f10d50911c6afe5f96c302ad9e2ba9d556044ae62121186adbd1b23,2024-12-28T19:15:06.197000
@ -274174,7 +274174,7 @@ CVE-2024-5116,0,0,4a940c91ec1fc17659226b607e57d928e24a4574770bd02c4de1e998985b38
CVE-2024-51162,0,0,f7989da3f04acdeccd7ac3514256e7ada64944ea90830784c7f181e1b7a668f8,2025-03-17T15:15:42.383000 CVE-2024-51162,0,0,f7989da3f04acdeccd7ac3514256e7ada64944ea90830784c7f181e1b7a668f8,2025-03-17T15:15:42.383000
CVE-2024-51163,0,0,8265e829e2344f7d7c5f73a82b08aadda352aa4cac2ac65fb619729ab1ada0ce,2025-03-18T19:15:45.977000 CVE-2024-51163,0,0,8265e829e2344f7d7c5f73a82b08aadda352aa4cac2ac65fb619729ab1ada0ce,2025-03-18T19:15:45.977000
CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000 CVE-2024-51164,0,0,d940764ceb362d708d88f9f5a08c2c1f5532b8b37b034d71dff6267e64a0a937,2024-12-09T17:15:09.107000
CVE-2024-51165,0,1,09e5a4cbc73bfd1107c50fbe64157b349956df181d1c4b7056fae5fc4f19af9f,2025-06-24T00:37:18.360000 CVE-2024-51165,0,0,09e5a4cbc73bfd1107c50fbe64157b349956df181d1c4b7056fae5fc4f19af9f,2025-06-24T00:37:18.360000
CVE-2024-5117,0,0,5d864bcdab117f69756aa6d93fdfc3ee233ea8f77d067abd8ad72750b44d714f,2025-02-10T14:35:26.263000 CVE-2024-5117,0,0,5d864bcdab117f69756aa6d93fdfc3ee233ea8f77d067abd8ad72750b44d714f,2025-02-10T14:35:26.263000
CVE-2024-51175,0,0,885b2e6c4d0fe90cff1f4b68a37268cb67e344c66db871427ee77d237ace4796,2024-12-18T16:15:13.807000 CVE-2024-51175,0,0,885b2e6c4d0fe90cff1f4b68a37268cb67e344c66db871427ee77d237ace4796,2024-12-18T16:15:13.807000
CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000 CVE-2024-51179,0,0,857fcabc550df085f68e65184c598436a379cf4f02ab73f3edfe252d5c778dbf,2024-11-13T20:35:10.303000
@ -276944,7 +276944,7 @@ CVE-2024-54998,0,0,03590b3c391b5b47d800e1d2036adf4bc4b08a27407c62b36182682faa965
CVE-2024-54999,0,0,7d688b5e6850db35622cee3d7c13ceaf526f67556bf50ea8d38cf86c561fb155,2025-01-13T21:15:13.497000 CVE-2024-54999,0,0,7d688b5e6850db35622cee3d7c13ceaf526f67556bf50ea8d38cf86c561fb155,2025-01-13T21:15:13.497000
CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000 CVE-2024-5500,0,0,280f34db2c8783872a68d6daa217e3e1e4614074bb8e8b0a741315b28d98613a,2024-11-21T09:47:49.373000
CVE-2024-55000,0,0,e280c3cc064d727179462b9cd205f0c92515872f32e7a1750a9b7cca5e8a5e01,2025-04-23T21:36:36.840000 CVE-2024-55000,0,0,e280c3cc064d727179462b9cd205f0c92515872f32e7a1750a9b7cca5e8a5e01,2025-04-23T21:36:36.840000
CVE-2024-55008,0,1,d4c98368bc64c087d2e1fcb093966fd10a9f20063391432efcebf491a2bd9f26,2025-06-24T00:19:17.740000 CVE-2024-55008,0,0,d4c98368bc64c087d2e1fcb093966fd10a9f20063391432efcebf491a2bd9f26,2025-06-24T00:19:17.740000
CVE-2024-55009,0,0,4d88f6b549f01d05c58601be5c8229fe460db1c49b9016496ca0b7d11afb4b4a,2025-03-24T17:45:45.890000 CVE-2024-55009,0,0,4d88f6b549f01d05c58601be5c8229fe460db1c49b9016496ca0b7d11afb4b4a,2025-03-24T17:45:45.890000
CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000 CVE-2024-5501,0,0,c16d3f86bb6f5e02795073b49cb84dc8c7e7a5718a6fed025ea914c4721b4cad,2024-11-21T09:47:49.573000
CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000 CVE-2024-5502,0,0,5a18d45bd85121e2ecc06d05133613fd7aff163eb02902343f6ea41930ef607b,2024-09-12T21:05:37.880000
@ -276978,7 +276978,7 @@ CVE-2024-55082,0,0,46e334548c0cc47791b6e59ad0b24cbe40324b7098a9a04eafe4a9b8f6aa2
CVE-2024-55085,0,0,0f4fecc56e251268778b80985d2c1b91c76af733933826a0e50972ec63399469,2025-04-17T01:57:38.213000 CVE-2024-55085,0,0,0f4fecc56e251268778b80985d2c1b91c76af733933826a0e50972ec63399469,2025-04-17T01:57:38.213000
CVE-2024-55086,0,0,fd47329e3e3807784056f0ae7a5ed1c4b66291f3c4daeca68905d8bcba1533f7,2025-04-18T17:25:15.047000 CVE-2024-55086,0,0,fd47329e3e3807784056f0ae7a5ed1c4b66291f3c4daeca68905d8bcba1533f7,2025-04-18T17:25:15.047000
CVE-2024-55088,0,0,adb05dfe3dc143c162a1807a74bc7b72a6799fd57e16689b3b44852521dbb401,2025-04-17T01:56:28.640000 CVE-2024-55088,0,0,adb05dfe3dc143c162a1807a74bc7b72a6799fd57e16689b3b44852521dbb401,2025-04-17T01:56:28.640000
CVE-2024-55089,0,1,ae30a2e50e3df2f6ac7905dbb62b2ad50ccd1ff6bca04780daa978f3fdca6c3e,2025-06-24T00:32:09.147000 CVE-2024-55089,0,0,ae30a2e50e3df2f6ac7905dbb62b2ad50ccd1ff6bca04780daa978f3fdca6c3e,2025-06-24T00:32:09.147000
CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000 CVE-2024-5509,0,0,c16ebc0014cda95d496b6742932639f7792e03934635fdd5674c231b03d21f00,2024-11-21T09:47:50.590000
CVE-2024-55093,0,0,b79b9e742f68681ca2ef1cb7df673f45058b48ef3359bdbf2d877411d5b9fb92,2025-04-23T18:32:54.217000 CVE-2024-55093,0,0,b79b9e742f68681ca2ef1cb7df673f45058b48ef3359bdbf2d877411d5b9fb92,2025-04-23T18:32:54.217000
CVE-2024-55099,0,0,bb5d8038fff96f2ebdc264769fc895066bde62862ee7a940cb7e11a89bf7adf5,2025-04-03T16:32:04.010000 CVE-2024-55099,0,0,bb5d8038fff96f2ebdc264769fc895066bde62862ee7a940cb7e11a89bf7adf5,2025-04-03T16:32:04.010000
@ -277962,8 +277962,8 @@ CVE-2024-56732,0,0,b8afa550e07ced01fe4bc3771dd4e27eb321ef6d140ae1b0e0a8b01eb97cd
CVE-2024-56733,0,0,c2474ef73dd56102a08444876977f4dc5534d1c12671d5b5a9d94af958afe92a,2024-12-30T17:15:09.990000 CVE-2024-56733,0,0,c2474ef73dd56102a08444876977f4dc5534d1c12671d5b5a9d94af958afe92a,2024-12-30T17:15:09.990000
CVE-2024-56734,0,0,127527bdaefb81c9eb3e5f3c9aeb8fcd2a7203002690791775ac4a054e77c7cf,2024-12-30T17:15:10.133000 CVE-2024-56734,0,0,127527bdaefb81c9eb3e5f3c9aeb8fcd2a7203002690791775ac4a054e77c7cf,2024-12-30T17:15:10.133000
CVE-2024-56736,0,0,f99faeb31f8f53f2cd7c7144f1f796ff7bda23a03c396d929f617bb9d04d038e,2025-04-23T19:13:22.287000 CVE-2024-56736,0,0,f99faeb31f8f53f2cd7c7144f1f796ff7bda23a03c396d929f617bb9d04d038e,2025-04-23T19:13:22.287000
CVE-2024-56737,0,1,e19b621e81bd19375dfddc6b7ad64275db36dbba5f79cccb4da4f5d3106bb5ac,2025-06-24T00:30:45.817000 CVE-2024-56737,0,0,e19b621e81bd19375dfddc6b7ad64275db36dbba5f79cccb4da4f5d3106bb5ac,2025-06-24T00:30:45.817000
CVE-2024-56738,0,1,f78f4f4cd72ad012370e41f0aff8079ec1623c39826da7a24bb7518196761616,2025-06-24T00:29:03.183000 CVE-2024-56738,0,0,f78f4f4cd72ad012370e41f0aff8079ec1623c39826da7a24bb7518196761616,2025-06-24T00:29:03.183000
CVE-2024-56739,0,0,4f6c09aecb431282e0adb0614c417ec109730556bc26b8429f533744c616ad23,2025-01-07T21:21:31.403000 CVE-2024-56739,0,0,4f6c09aecb431282e0adb0614c417ec109730556bc26b8429f533744c616ad23,2025-01-07T21:21:31.403000
CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000 CVE-2024-5674,0,0,7c06c249e0424ac37040b124ed7da9cd19cf8f5ce54c37fa3d48f3eda72c297e,2024-11-21T09:48:08.183000
CVE-2024-56740,0,0,70a50e80e6a90e1d35505246d853ee996c83b7e5576c2651235f05a5725944be,2025-01-07T22:24:05.593000 CVE-2024-56740,0,0,70a50e80e6a90e1d35505246d853ee996c83b7e5576c2651235f05a5725944be,2025-01-07T22:24:05.593000
@ -278285,11 +278285,11 @@ CVE-2024-5741,0,0,055094e9aabecf080e8eb2a3d882a04f3fba90f18ee04ead7d8cff271ac3f0
CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000 CVE-2024-5742,0,0,3d67a98aab4ea452eccb3180d74817d102c8dc01405b893ad9d75b571593ba72,2024-11-21T09:48:16.117000
CVE-2024-57423,0,0,429f48fbaf4d5ee4a0cd9793b36f1772e906da37e9a96d25c9aa463c5f307f7e,2025-04-07T18:45:18.343000 CVE-2024-57423,0,0,429f48fbaf4d5ee4a0cd9793b36f1772e906da37e9a96d25c9aa463c5f307f7e,2025-04-07T18:45:18.343000
CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000 CVE-2024-57426,0,0,ba87cb306cce9c7c1734003f734ff798cd387a60923d8c8325abd2c359c44417,2025-02-11T22:15:29.347000
CVE-2024-57427,0,1,7b0850565fd1a3e60c7f6c51d0338062cc137b7a7c1b3dcc1431a9586985f965,2025-06-24T00:13:56.393000 CVE-2024-57427,0,0,7b0850565fd1a3e60c7f6c51d0338062cc137b7a7c1b3dcc1431a9586985f965,2025-06-24T00:13:56.393000
CVE-2024-57428,0,1,f8af63df4d5299734d280e4c907fb090afce81f8d4786f9daabb293aebe652ab,2025-06-24T00:13:30.770000 CVE-2024-57428,0,0,f8af63df4d5299734d280e4c907fb090afce81f8d4786f9daabb293aebe652ab,2025-06-24T00:13:30.770000
CVE-2024-57429,0,1,cd9c465c7350beb6f4629437e1f5699878bf6325c073fd6900a1e3d91de52d96,2025-06-24T00:13:05.303000 CVE-2024-57429,0,0,cd9c465c7350beb6f4629437e1f5699878bf6325c073fd6900a1e3d91de52d96,2025-06-24T00:13:05.303000
CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000 CVE-2024-5743,0,0,8df1bf94ad8183aa6e1d1e737442c566d99a7f0b2a8ad07fdc7acab75f5a831f,2025-01-13T18:15:19.517000
CVE-2024-57430,0,1,73ef528a86b34f798a23c35d9b2d10d0ac59fa81eb78113a9cec45056067f1fd,2025-06-24T00:12:38.623000 CVE-2024-57430,0,0,73ef528a86b34f798a23c35d9b2d10d0ac59fa81eb78113a9cec45056067f1fd,2025-06-24T00:12:38.623000
CVE-2024-57432,0,0,380d211416623b84511e89447189d47b0683a0b0ccc670e5ff43709b349e197a,2025-03-13T14:15:34.393000 CVE-2024-57432,0,0,380d211416623b84511e89447189d47b0683a0b0ccc670e5ff43709b349e197a,2025-03-13T14:15:34.393000
CVE-2024-57433,0,0,6410b406a0e0b152007902343f9fefbfa962b28d3b64850e594a5feb9fbf15e9,2025-04-22T15:32:09.543000 CVE-2024-57433,0,0,6410b406a0e0b152007902343f9fefbfa962b28d3b64850e594a5feb9fbf15e9,2025-04-22T15:32:09.543000
CVE-2024-57434,0,0,4244b330e3a1885db4ab6f35e89cd62516d8c5c96589e07e344c7d548e1386e0,2025-04-22T15:29:06.090000 CVE-2024-57434,0,0,4244b330e3a1885db4ab6f35e89cd62516d8c5c96589e07e344c7d548e1386e0,2025-04-22T15:29:06.090000
@ -288966,7 +288966,7 @@ CVE-2025-2610,0,0,d9535a1c139910205321aca35370cfc0b0260764ca92a5dd60f7ed3f175def
CVE-2025-26125,0,0,4ae7f7ba353601c45dbee82b55634f507486c612ec0e7fb0295802c5ca1a95ba,2025-03-24T13:15:25.920000 CVE-2025-26125,0,0,4ae7f7ba353601c45dbee82b55634f507486c612ec0e7fb0295802c5ca1a95ba,2025-03-24T13:15:25.920000
CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6d15,2025-03-17T18:15:21.860000 CVE-2025-26127,0,0,ff848518068745ae246227c687011816436068efa4d4914700821387766f6d15,2025-03-17T18:15:21.860000
CVE-2025-2613,0,0,f71787ed84ffbf1c331c926037e10f24c0e248005493cbe1f0f2c6e85a68fd24,2025-04-21T14:23:45.950000 CVE-2025-2613,0,0,f71787ed84ffbf1c331c926037e10f24c0e248005493cbe1f0f2c6e85a68fd24,2025-04-21T14:23:45.950000
CVE-2025-26136,0,1,dd9385473c9de6671090737c25c945df8fcb57e05d63e2da81bba3bba0b8a98a,2025-06-24T00:54:20.497000 CVE-2025-26136,0,0,dd9385473c9de6671090737c25c945df8fcb57e05d63e2da81bba3bba0b8a98a,2025-06-24T00:54:20.497000
CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000 CVE-2025-26137,0,0,004205e5376adff96c010e010531e03852f5eb4905a1a3c73ed331cf2f44f325,2025-04-01T20:37:44.117000
CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000 CVE-2025-26138,0,0,4c83b447574a31d9857c309d7f5649f5104ee78c2e6617a4327eaace6a44e40b,2025-04-01T20:37:28.490000
CVE-2025-26153,0,0,fbd54e08d3ed017020223f9a7b6b482516a3990fb93f496abb0ee8889236b21e,2025-04-18T12:15:15.033000 CVE-2025-26153,0,0,fbd54e08d3ed017020223f9a7b6b482516a3990fb93f496abb0ee8889236b21e,2025-04-18T12:15:15.033000
@ -289024,7 +289024,7 @@ CVE-2025-26310,0,0,bb747416a75309b2ca1743631d93c303f929a0869d292e44b67e8cc57059c
CVE-2025-26311,0,0,dcc2d91354c6953620d7cd9d6f4d7e8f27be741909235cc9365a55dbbf5c64c2,2025-04-17T18:05:28.417000 CVE-2025-26311,0,0,dcc2d91354c6953620d7cd9d6f4d7e8f27be741909235cc9365a55dbbf5c64c2,2025-04-17T18:05:28.417000
CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000 CVE-2025-26312,0,0,f394aa1aa4dfb775ebb7188f76a9b0a21eaabe1fd9b9e3fe5dc73353a18f5288,2025-03-17T16:15:25.637000
CVE-2025-26318,0,0,84d066d40995f86f82311ffc56dc1f81fd70a062203c7c5ea702e8cb9cb3ac6c,2025-04-03T14:15:31.493000 CVE-2025-26318,0,0,84d066d40995f86f82311ffc56dc1f81fd70a062203c7c5ea702e8cb9cb3ac6c,2025-04-03T14:15:31.493000
CVE-2025-26319,0,1,fef01cd98d2fb4f5b4a27b14dc42c0de2b3827b06a99cb65c6ed5675e692e01d,2025-06-24T00:50:39.497000 CVE-2025-26319,0,0,fef01cd98d2fb4f5b4a27b14dc42c0de2b3827b06a99cb65c6ed5675e692e01d,2025-06-24T00:50:39.497000
CVE-2025-2632,0,0,2dd8e8421446af075f78efef400514791a43dd10d04914537d27aeda54aae080,2025-04-11T15:40:10.277000 CVE-2025-2632,0,0,2dd8e8421446af075f78efef400514791a43dd10d04914537d27aeda54aae080,2025-04-11T15:40:10.277000
CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000 CVE-2025-26320,0,0,2c7c4543047844dc51d38a0e0844ae377a705f600f7e38264bf4c89a9fa42fbb,2025-03-05T19:15:39.173000
CVE-2025-26325,0,0,2e5ceacac9fb18c7c9bbe167db2438cbf5683b3622ff11580ca9540807c11c99,2025-04-10T17:28:00.773000 CVE-2025-26325,0,0,2e5ceacac9fb18c7c9bbe167db2438cbf5683b3622ff11580ca9540807c11c99,2025-04-10T17:28:00.773000
@ -290023,10 +290023,10 @@ CVE-2025-27615,0,0,dffb5f3398f09a513420b3be1d64f06c647ff90a89a35bcb5178bc8bdf5ab
CVE-2025-27616,0,0,aa85adc195b5955511bb21f9cfe98ae7538d310a0fced9a0aeaaa4a683a54ec6,2025-03-10T19:15:41.080000 CVE-2025-27616,0,0,aa85adc195b5955511bb21f9cfe98ae7538d310a0fced9a0aeaaa4a683a54ec6,2025-03-10T19:15:41.080000
CVE-2025-27617,0,0,301ffaccadc2ce8c8d5bb86b9b969df111c43a03b8d988cca8ae24179376e48c,2025-03-11T16:15:18.310000 CVE-2025-27617,0,0,301ffaccadc2ce8c8d5bb86b9b969df111c43a03b8d988cca8ae24179376e48c,2025-03-11T16:15:18.310000
CVE-2025-2762,0,0,829fc248e3d8245ea40a9748f202281af81aadc309b6f1752ec9d6c292dde219,2025-04-29T13:52:47.470000 CVE-2025-2762,0,0,829fc248e3d8245ea40a9748f202281af81aadc309b6f1752ec9d6c292dde219,2025-04-29T13:52:47.470000
CVE-2025-27622,0,1,7fb5c8f8e020078a9a159e8fc3a43a779f12ae5f2ebc198b85d2f93f81663462,2025-06-24T00:48:40.867000 CVE-2025-27622,0,0,7fb5c8f8e020078a9a159e8fc3a43a779f12ae5f2ebc198b85d2f93f81663462,2025-06-24T00:48:40.867000
CVE-2025-27623,0,1,d810ebe6850eefc0e4d2c5e6455a1d4209b1343c58e2b568376aebf43b9905ba,2025-06-24T00:46:38.817000 CVE-2025-27623,0,0,d810ebe6850eefc0e4d2c5e6455a1d4209b1343c58e2b568376aebf43b9905ba,2025-06-24T00:46:38.817000
CVE-2025-27624,0,1,1a2e32356995ba134586f112ebb661a70663489beed98e1ada04ca642cdb5553,2025-06-24T00:45:20.613000 CVE-2025-27624,0,0,1a2e32356995ba134586f112ebb661a70663489beed98e1ada04ca642cdb5553,2025-06-24T00:45:20.613000
CVE-2025-27625,0,1,4314492f98358060afb68934de0a8daabd38050ca5e9adb40c671e7d46b6f624,2025-06-24T00:42:16.010000 CVE-2025-27625,0,0,4314492f98358060afb68934de0a8daabd38050ca5e9adb40c671e7d46b6f624,2025-06-24T00:42:16.010000
CVE-2025-2763,0,0,b362b6f3ba794553331e941e273490f6e3566b052044c350899fb3ad9b0f52fc,2025-04-29T13:52:47.470000 CVE-2025-2763,0,0,b362b6f3ba794553331e941e273490f6e3566b052044c350899fb3ad9b0f52fc,2025-04-29T13:52:47.470000
CVE-2025-27631,0,0,b515a6ae2dd38363f2c2c2d7543d195231ce240fb0aace417e20d81978794417,2025-03-27T16:45:46.410000 CVE-2025-27631,0,0,b515a6ae2dd38363f2c2c2d7543d195231ce240fb0aace417e20d81978794417,2025-03-27T16:45:46.410000
CVE-2025-27632,0,0,f938475bec3d54e9af6729719b2a8eb383c12c8f5092f562b95c9a54bf2645ab,2025-03-27T16:45:46.410000 CVE-2025-27632,0,0,f938475bec3d54e9af6729719b2a8eb383c12c8f5092f562b95c9a54bf2645ab,2025-03-27T16:45:46.410000
@ -293665,14 +293665,18 @@ CVE-2025-34028,0,0,5921097810a177c4353bfac19f550e88ddb782dc2bdfd50f1c119b90d9521
CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000 CVE-2025-34029,0,0,fce8cf00dbe90f2e2f66f959940597018af6c7d9b991eb3c7e5416bdc6367309,2025-06-23T20:16:21.633000
CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000 CVE-2025-3403,0,0,5499ba1d1841e737df5ef1f2a2d32505df727eeda279da8a9f0ff20d660ca6b7,2025-04-08T19:15:53.387000
CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000 CVE-2025-34030,0,0,f524795d494d41af1abb43d588204e0e445079de2112dc398bcbfb7219de5267,2025-06-23T20:16:21.633000
CVE-2025-34031,1,1,d674798b60926c158bbb7bb2ed37489f3fec5cf14ecb839d75a5ecaf440233ac,2025-06-24T01:15:23.340000 CVE-2025-34031,0,1,a83a89ead5008a99e70e59878287331f19ed475018e97ea254d5a6edcad82428,2025-06-24T03:15:32.860000
CVE-2025-34032,1,1,1ffec99489e181c39b05eb5cbdd8518148acd077ccb9c01dac67fa321ff5bac6,2025-06-24T01:15:24.350000 CVE-2025-34032,0,1,1662c51249658a2df2b7fe7125b51d9c24492c5099a19327f9c89f372b8d7c6f,2025-06-24T03:15:32.987000
CVE-2025-34033,1,1,dffe0e9a3e5ee29453eb3edace0da3850a7b2f9d4964b9671fa378b48abbe22f,2025-06-24T01:15:24.493000 CVE-2025-34033,0,1,efbb2094e27eadf32cf2e2b87f771d72dc8ffd0952a128e2c253c810271eb5fe,2025-06-24T03:15:33.090000
CVE-2025-34034,1,1,d1f1f09fd63f4f58e398122c8aaa997fcdef4865d9a65b4c3a6fc6bb27b65b36,2025-06-24T01:15:24.630000 CVE-2025-34034,0,1,9349522151798c41468e27385e7fbe77af654ab0fc85de66c1e4f22953696889,2025-06-24T03:15:33.193000
CVE-2025-34035,1,1,65671e3ec5b12513e7f829e6b47189e2c9ad951a7d5a9be90d1140906217654d,2025-06-24T01:15:24.763000 CVE-2025-34035,0,1,ce2721f03a0b278f0cc26f99ff904d9fab13fc67019d936b442cf9447da7781d,2025-06-24T03:15:33.293000
CVE-2025-34036,1,1,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000 CVE-2025-34036,0,0,6b7350c61be49a76f76dc5d944c8fd7a529dcca7640facf7eca714339387463d,2025-06-24T01:15:24.903000
CVE-2025-34037,1,1,81976660092318b594423c402c70444ef718cbe43821372ad6d92bf8074adec2,2025-06-24T01:15:25.037000 CVE-2025-34037,0,1,57a7e6a6846827b91b7736feffed008814a2f3414dc595a6f1c81aa1a94cc3f7,2025-06-24T03:15:33.400000
CVE-2025-34038,1,1,d6d8009e58294a673d7d0c556296273a5a5d83087c8fbf680e06184934d5f96d,2025-06-24T03:15:33.507000
CVE-2025-34039,1,1,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0806,2025-06-24T02:15:22.540000
CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000 CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000
CVE-2025-34040,1,1,ab246a583bbce961c122b7ec2fd5e7d841d24372c199b5859888943ef451ba8c,2025-06-24T02:15:22.673000
CVE-2025-34041,1,1,e333513a767b39341f0e963179ee4f68eb159feea05cdd92f7bde27fcf9c7f8e,2025-06-24T02:15:22.820000
CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000 CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000 CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000 CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000
@ -297337,7 +297341,15 @@ CVE-2025-48447,0,0,f1064a55c619ba121930a53f8ef33a80015883f6e69dc2f6e30ce6674f9bd
CVE-2025-48448,0,0,d45e98596ff7c4bfe1172c4147c3bf90df1269483f2072c8e1e6cb8ccc1b62bf,2025-06-20T13:06:18.167000 CVE-2025-48448,0,0,d45e98596ff7c4bfe1172c4147c3bf90df1269483f2072c8e1e6cb8ccc1b62bf,2025-06-20T13:06:18.167000
CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000 CVE-2025-4845,0,0,5d1b81810c6ca4083e9e97cb1e8cb24890cd9aa68161fff1d9a41ed5b829a66e,2025-06-04T20:11:09.500000
CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18edc,2025-05-19T13:35:20.460000 CVE-2025-4846,0,0,567ea58beeefb674198c2f090a4debb893b74f8f25c0b605e548238fa1a18edc,2025-05-19T13:35:20.460000
CVE-2025-48461,1,1,d4cb24a0ca958cfd524c8a208e61c21b45cf30bd8935dde1980a1409ead6ce43,2025-06-24T03:15:33.613000
CVE-2025-48462,1,1,a92baa8fe34e131d9c05e73e0d06f620a35a927c149b8a5afca7f6d615e5a9f8,2025-06-24T03:15:33.753000
CVE-2025-48463,1,1,7211400d6d7dbb163df4d1008261d95ee2fec45c1732b246e55db30906f17381,2025-06-24T03:15:33.870000
CVE-2025-48466,1,1,302b754f6f6ff88f885556cb3e15791fcb2f400c2eea512dc96e81d9b734629b,2025-06-24T03:15:34.013000
CVE-2025-48467,1,1,65ada2888e88fb5c0497eb399176437531d80946e5f7d88848de64f9fa9754e8,2025-06-24T03:15:34.140000
CVE-2025-48468,1,1,e3f82796a87497059e9699052564dbe55665dc97b241dd7ec175041e0dcb7a93,2025-06-24T03:15:34.267000
CVE-2025-48469,1,1,172cdce077fd14d9ebe336da59ab28d888edcd39b6f64ba16ee3c9ab53de8c80,2025-06-24T03:15:34.390000
CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000 CVE-2025-4847,0,0,6fb9786d7d0457ea8b5c8f209062b29242bda3291cd69f18d9d7b36a0b0e46d5,2025-06-04T20:11:01.580000
CVE-2025-48470,1,1,bebff4979ebac402ac5fcc2e1f497aa497fdbbae56eeb86825f3178611a020e0,2025-06-24T03:15:34.523000
CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000 CVE-2025-48471,0,0,25591a47ceebc9413e1a4bcc266afa32d48e14080e918a48e442eef7eb535038,2025-06-10T15:13:08.177000
CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000 CVE-2025-48472,0,0,0c03c2da2260304575e0e5d7114e8a1cf6004a3b1aff992137a8bc3deefc4ba5,2025-06-10T15:13:16.167000
CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000 CVE-2025-48473,0,0,8f944e6ce99279110ffb70ec695a019f55fee49730724dd8b784bed7dcb47d31,2025-05-30T16:31:03.107000
@ -298244,9 +298256,11 @@ CVE-2025-52556,0,0,01d14cdcd651409b8ec6f2a117321e576266f60affdb5d61d3b6cf66da0be
CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000 CVE-2025-52557,0,0,d6ac46828bdd4bd5689e0ed9e6db622a0cd2c5e50b4932c5603e932a5d57d26a,2025-06-23T20:16:21.633000
CVE-2025-52558,0,0,312418a98262707982a793371eca0fa75acc6958423c04e8a653116a74214a69,2025-06-23T21:15:26.423000 CVE-2025-52558,0,0,312418a98262707982a793371eca0fa75acc6958423c04e8a653116a74214a69,2025-06-23T21:15:26.423000
CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000 CVE-2025-5256,0,0,8e276989283383806f3abf5c20dbe67142f0dc8ca07046605c539922633ebc4a,2025-05-29T14:29:50.247000
CVE-2025-52560,1,1,2816b0e31556b261f5ae164a073a7017e2fb8c2e87a00569de8e81436c2d8df6,2025-06-24T03:15:34.653000
CVE-2025-52561,0,0,de14de6e04dddaa9a1477840b59ee04f631f59ec755018a4483ce3081c807b0a,2025-06-23T21:15:26.570000 CVE-2025-52561,0,0,de14de6e04dddaa9a1477840b59ee04f631f59ec755018a4483ce3081c807b0a,2025-06-23T21:15:26.570000
CVE-2025-52562,0,0,71dd25f3bc7ea4bcad36c0d751ccde968119f77e0cfe3d00439d8fcb91d44c5a,2025-06-23T21:15:26.710000 CVE-2025-52562,0,0,71dd25f3bc7ea4bcad36c0d751ccde968119f77e0cfe3d00439d8fcb91d44c5a,2025-06-23T21:15:26.710000
CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000 CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcfa1,2025-05-29T14:29:50.247000
CVE-2025-52574,1,1,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000 CVE-2025-5259,0,0,762eb0e82b940f038c9de9747260da22e83abc89d044ade4d08f1060ed5d681a,2025-05-30T16:31:03.107000
CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000 CVE-2025-5262,0,0,8d158d6fd94524fd413794cf0b5bc75dd7b83edc10bc60eca4a90ef0afe5fb85,2025-05-27T18:15:31.980000
CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000 CVE-2025-5263,0,0,aa86671b7ea99b1d0dfc0c6352f8f2192817a359ea9bf4567f068ac38cd6af34,2025-06-11T12:15:27.183000
@ -298325,6 +298339,15 @@ CVE-2025-52967,0,0,f8f7ac307e05f8cf5c963f63b22d275fece0ae79c658522551054a17be453
CVE-2025-52968,0,0,d8879824cdcdc2d7403d9f8f5973d765aba0466d5a7f5cf0c5e7fbb53155130e,2025-06-23T20:16:21.633000 CVE-2025-52968,0,0,d8879824cdcdc2d7403d9f8f5973d765aba0466d5a7f5cf0c5e7fbb53155130e,2025-06-23T20:16:21.633000
CVE-2025-52969,0,0,e5ee905bfae6a06ed06ff5a2c89561193059d838d7fdcd661c6efa26b26a470d,2025-06-23T20:16:21.633000 CVE-2025-52969,0,0,e5ee905bfae6a06ed06ff5a2c89561193059d838d7fdcd661c6efa26b26a470d,2025-06-23T20:16:21.633000
CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000 CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
CVE-2025-52971,1,1,237340cc6ffd385d40658506fb0d02f7f34a50767efaaaf31e1454a4e79cae88,2025-06-24T03:15:34.947000
CVE-2025-52972,1,1,0da91a693f0d643d7ea643d24e82c310389052281e6c26df73d8b972947ca274,2025-06-24T03:15:35.027000
CVE-2025-52973,1,1,7d03d2a4bdd2243951264a1c52d4bd2dcdfabc7047edac6879e8e21d20eb231e,2025-06-24T03:15:35.090000
CVE-2025-52974,1,1,6f31d4020f09bd8d82d5225a40f7b3960e6a47d694d4e5d20d3e0b7b77742d96,2025-06-24T03:15:35.147000
CVE-2025-52975,1,1,0e609d34e0c828e91e2598649e3ab30922da6dd0acaaaf197526bca81897c4a7,2025-06-24T03:15:35.210000
CVE-2025-52976,1,1,7bb656783c842984a9024381f4b7750310ea675f33a84ba7515c3e41b3249efe,2025-06-24T03:15:35.270000
CVE-2025-52977,1,1,f9eee2b0485a24704a632fb94ffd8d3e925d5899df987a156c8ee665b2646f0b,2025-06-24T03:15:35.333000
CVE-2025-52978,1,1,536489d1a428144098c443cda432c2d1561802f8cd5aef013e6017d2712757fe,2025-06-24T03:15:35.393000
CVE-2025-52979,1,1,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3712,2025-06-24T03:15:35.453000
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000 CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000 CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000 CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
@ -298679,7 +298702,7 @@ CVE-2025-5763,0,0,a15a3a2b0366b1c66dcf3b366b895c7439dfb4d30e432b0e7f8ed791e648ad
CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000 CVE-2025-5764,0,0,2d28a1f65a433690f9d2f8261def9db24023e822b530c5b66d4068781293abda,2025-06-10T19:29:57.893000
CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000 CVE-2025-5765,0,0,cf1c505b8511f3d7107b049f561769a46f8060e4722ef9f239daeb196ff8da86,2025-06-10T19:29:44.973000
CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000 CVE-2025-5766,0,0,28ff5fc5d5092ea27c0ea445f8523dc92a0b61bbfca49399a743b91e6135f816,2025-06-10T19:29:34.820000
CVE-2025-5777,0,1,0598dd8f984bb290ccf6035d8ab5d034dfa57295efc4f89d42d600fd8cf230ec,2025-06-24T01:15:25.177000 CVE-2025-5777,0,0,0598dd8f984bb290ccf6035d8ab5d034dfa57295efc4f89d42d600fd8cf230ec,2025-06-24T01:15:25.177000
CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000 CVE-2025-5778,0,0,5f200e53fd6421895a453b111aeb1386ab25cc3e45de20df15c46216ef4a37f8,2025-06-09T12:15:47.880000
CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000 CVE-2025-5779,0,0,1e700fadb20c430a15a195537975215f0a5a558e649a2a5a5d9bb126f7483d20,2025-06-10T19:26:20.883000
CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000 CVE-2025-5780,0,0,291144f4a381da80b9438fe643e4a6c8cc152547ccff2703d0e51362f127b808,2025-06-10T19:26:11.937000
@ -299132,10 +299155,15 @@ CVE-2025-6527,0,0,a9a66d6d6a8e0192016e66fcbc4b16654b5cc67da7f8d638e0a1029d3e911b
CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000 CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000
CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000 CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000
CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000 CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000
CVE-2025-6531,1,1,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000 CVE-2025-6531,0,0,d50d6ae82fb8168856da35552b669299a85e5954fcbcd9145d4e9001056a9940,2025-06-24T00:15:25.917000
CVE-2025-6532,1,1,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000 CVE-2025-6532,0,0,f045d33f336030aac6bc659f0e76b4f67938e1fa62f91ed9a7dcc7388277bc3d,2025-06-24T00:15:26.213000
CVE-2025-6533,1,1,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000 CVE-2025-6533,0,0,acda853366c2c017a02233aa53f424d13f44087d6fa69452779a88de8132b41e,2025-06-24T00:15:26.397000
CVE-2025-6534,1,1,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000 CVE-2025-6534,0,0,8d84160f3e12d58cb253923c278d312cf4073fd0f90fe9eb6bb8d69f1025e0fd,2025-06-24T01:15:25.303000
CVE-2025-6535,1,1,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000 CVE-2025-6535,0,0,8a2e2c08150c23298f895d6a8de96df4340489455f5e26a4dde31f70afc5bfd3,2025-06-24T01:15:25.513000
CVE-2025-6536,1,1,d013adec60ee7bce984765f553f00621206bf7b36426e84a34c5c79dd02e790d,2025-06-24T02:15:22.967000
CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000 CVE-2025-6545,0,0,4a2e9a49fc7908d94e6672d7a2b53a6f95fca2e09b0d849d624a1d4044dc33c8,2025-06-23T20:16:21.633000
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000 CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
CVE-2025-6551,1,1,a52fe52125cb153ac1dee3a35a2dc92fb922b4d13172e77504580f4841a730e4,2025-06-24T02:15:23.170000
CVE-2025-6552,1,1,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
CVE-2025-6559,1,1,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
CVE-2025-6560,1,1,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000

Can't render this file because it is too large.