mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-06-23T18:00:26.982876+00:00
This commit is contained in:
parent
1e14d1b12f
commit
03b3cd9ee1
29
CVE-2023/CVE-2023-470xx/CVE-2023-47031.json
Normal file
29
CVE-2023/CVE-2023-470xx/CVE-2023-47031.json
Normal file
@ -0,0 +1,29 @@
|
||||
{
|
||||
"id": "CVE-2023-47031",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T17:15:27.313",
|
||||
"lastModified": "2025-06-23T17:15:27.313",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "http://ncr.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "http://terminal.com",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-470xx/CVE-2023-47032.json
Normal file
25
CVE-2023/CVE-2023-470xx/CVE-2023-47032.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-47032",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:23.920",
|
||||
"lastModified": "2025-06-23T16:15:23.920",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Password Vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the UserService SOAP API function."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-472xx/CVE-2023-47294.json
Normal file
25
CVE-2023/CVE-2023-472xx/CVE-2023-47294.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-47294",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.493",
|
||||
"lastModified": "2025-06-23T16:15:24.493",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47294/CVE-2023-47294.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
25
CVE-2023/CVE-2023-472xx/CVE-2023-47295.json
Normal file
25
CVE-2023/CVE-2023-472xx/CVE-2023-47295.json
Normal file
@ -0,0 +1,25 @@
|
||||
{
|
||||
"id": "CVE-2023-47295",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.623",
|
||||
"lastModified": "2025-06-23T16:15:24.623",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A CSV injection vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands via injecting a crafted payload into any text field that accepts strings."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
21
CVE-2023/CVE-2023-504xx/CVE-2023-50450.json
Normal file
21
CVE-2023/CVE-2023-504xx/CVE-2023-50450.json
Normal file
@ -0,0 +1,21 @@
|
||||
{
|
||||
"id": "CVE-2023-50450",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T16:15:24.743",
|
||||
"lastModified": "2025-06-23T16:15:24.743",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director utiliza el servicio de aplicaciones Cisco NCS. Los directores activos y en espera se comunican a trav\u00e9s de los puertos TCP 4566 y 4570 para intercambiar informaci\u00f3n de alta disponibilidad (HA) mediante una contrase\u00f1a compartida. Las versiones afectadas de Versa Director est\u00e1n vinculadas a estos puertos en todas las interfaces. Un atacante que acceda a Versa Director podr\u00eda acceder al servicio NCS en el puerto 4566 y explotarlo para realizar acciones administrativas no autorizadas y ejecutar c\u00f3digo remoto. Se recomienda a los clientes seguir la gu\u00eda de refuerzo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21550",
|
||||
"sourceIdentifier": "secalert_us@oracle.com",
|
||||
"published": "2025-01-21T21:15:21.510",
|
||||
"lastModified": "2025-06-23T15:25:05.683",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-03-13T15:15:51.980",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,40 +51,10 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "3BBB9F8E-7374-4426-A269-FB669644538F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "C28D8453-2E02-43C3-8998-8B694F4B7505"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "49BE74EB-7D30-47FF-B1BD-21A57CD091B1"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
|
||||
"source": "secalert_us@oracle.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
"source": "secalert_us@oracle.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor de respaldo por parte de un usuario de dominio autenticado"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director implementa la autenticaci\u00f3n de dos factores (2FA) mediante c\u00f3digos de acceso de un solo uso (OTP) enviados por correo electr\u00f3nico o SMS. Versa Director acepta la entrada de usuarios no confiables al enviar c\u00f3digos 2FA, lo que permite a un atacante que conoce un nombre de usuario y una contrase\u00f1a v\u00e1lidos redirigir el env\u00edo de OTP (SMS/correo electr\u00f3nico) a su propio dispositivo. Los c\u00f3digos OTP/TOTP no se invalidan despu\u00e9s de su uso, lo que permite su reutilizaci\u00f3n por un atacante que haya interceptado u obtenido previamente un c\u00f3digo v\u00e1lido. Adem\u00e1s, el sistema 2FA no restringe adecuadamente el n\u00famero ni la frecuencia de los intentos de inicio de sesi\u00f3n. Los valores OTP se generan a partir de un espacio de claves relativamente peque\u00f1o, lo que facilita los ataques de fuerza bruta. Estado de explotaci\u00f3n: Versa Networks no tiene conocimiento de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite personalizar la interfaz de usuario, incluyendo el encabezado, el pie de p\u00e1gina y el logotipo. Sin embargo, la informaci\u00f3n proporcionada para estas personalizaciones no se valida ni se depura adecuadamente, lo que permite que un usuario malintencionado inyecte y almacene cargas \u00fatiles de Cross-site Scripting (XSS). Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para desactivar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye la funcionalidad para iniciar sesiones SSH con CPE remotos y el shell de Director mediante Shell-In-A-Box. El script de Python subyacente, shell-connect.py, es vulnerable a la inyecci\u00f3n de comandos mediante el argumento de usuario. Esto permite a un atacante ejecutar comandos arbitrarios en el sistema. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN ofrece la opci\u00f3n de cargar varios tipos de archivos. Versa Director no limita correctamente los permisos de carga de archivos. La interfaz de usuario parece no permitir la carga de archivos, pero aun as\u00ed se carga correctamente. Adem\u00e1s, Versa Director revela el nombre completo de los archivos temporales cargados, incluido el prefijo UUID. La carga insegura de im\u00e1genes UCPE en Versa Director permite que un atacante autenticado cargue un webshell. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye una funci\u00f3n de webhook para enviar notificaciones a endpoints HTTP externos. Sin embargo, un usuario autenticado puede abusar de las funciones \"A\u00f1adir webhook\" y \"Probar webhook\" para enviar solicitudes HTTP manipuladas al host local. Esto puede aprovecharse para ejecutar comandos en nombre del usuario de Versa, que tiene privilegios de sudo, lo que podr\u00eda provocar una escalada de privilegios o la ejecuci\u00f3n remota de c\u00f3digo. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN proporciona acceso web directo a las m\u00e1quinas virtuales uCPE a trav\u00e9s de la interfaz gr\u00e1fica de Director. De forma predeterminada, el servicio websockify est\u00e1 expuesto en el puerto 6080 y es accesible desde internet. Esta exposici\u00f3n supone un riesgo significativo, ya que websockify presenta vulnerabilidades conocidas que pueden explotarse, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Restrinja el acceso al puerto TCP 6080 si no necesita acceder a la consola uCPE. Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad que permite a un usuario autenticado con el rol de Operador de respaldo modificar trabajos de respaldo, lo que podr\u00eda ejecutar c\u00f3digo arbitrario."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad que permite a los usuarios del sistema local modificar el contenido del directorio, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema local con permisos elevados."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El software Versa Director expone varios servicios por defecto y facilita el acceso a los atacantes gracias a las credenciales predeterminadas y a varias cuentas (la mayor\u00eda con acceso sudo) que utilizan las mismas credenciales predeterminadas. Por defecto, Versa Director expone SSH y Postgres a internet, junto con otros servicios. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda los siguientes controles de seguridad: 1) Cambiar las contrase\u00f1as predeterminadas por contrase\u00f1as complejas. 2) Las contrase\u00f1as deben ser complejas, con al menos 8 caracteres (may\u00fasculas y min\u00fasculas), adem\u00e1s de al menos un d\u00edgito y un car\u00e1cter especial. 3) Las contrase\u00f1as deben cambiarse al menos cada 90 d\u00edas. 4) Se revisa el historial de cambios de contrase\u00f1a para garantizar que se utilicen al menos las \u00faltimas 5 contrase\u00f1as al cambiarlas. 5) Revisar y auditar los registros de todos los intentos de autenticaci\u00f3n para detectar intentos de inicio de sesi\u00f3n no autorizados o sospechosos y aplicar medidas correctivas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite cargar diversos tipos de archivos. Sin embargo, el c\u00f3digo Java que gestiona la carga de archivos contiene una vulnerabilidad de inyecci\u00f3n de argumentos. Al a\u00f1adir argumentos adicionales al nombre del archivo, un atacante puede eludir la validaci\u00f3n de tipo MIME, lo que permite cargar archivos de cualquier tipo. Esta vulnerabilidad puede explotarse para almacenar un archivo malicioso en el disco. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. No existen soluciones alternativas para desactivar la opci\u00f3n de interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
|
@ -3,7 +3,7 @@
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-22T18:16:01.170",
|
||||
"lastModified": "2025-04-23T14:08:13.383",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
60
CVE-2025/CVE-2025-45xx/CVE-2025-4563.json
Normal file
60
CVE-2025/CVE-2025-45xx/CVE-2025-4563.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-4563",
|
||||
"sourceIdentifier": "jordan@liggitt.net",
|
||||
"published": "2025-06-23T16:15:27.350",
|
||||
"lastModified": "2025-06-23T16:15:27.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "jordan@liggitt.net",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 2.7,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "jordan@liggitt.net",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/kubernetes/kubernetes/issues/132151",
|
||||
"source": "jordan@liggitt.net"
|
||||
},
|
||||
{
|
||||
"url": "https://groups.google.com/g/kubernetes-security-announce/c/Zv84LMRuvMQ",
|
||||
"source": "jordan@liggitt.net"
|
||||
}
|
||||
]
|
||||
}
|
@ -9,6 +9,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash"
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "El desbordamiento de b\u00fafer en OpenVPN ovpn-dco-win versi\u00f3n 1.3.0 y anteriores y versi\u00f3n 2.5.8 y anteriores permite que un proceso de usuario local env\u00ede un b\u00fafer de mensaje de control demasiado grande al controlador del kernel, lo que provoca un bloqueo del sistema."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-52968",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T15:15:29.350",
|
||||
"lastModified": "2025-06-23T15:15:29.350",
|
||||
"lastModified": "2025-06-23T17:15:30.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -15,7 +15,7 @@
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin."
|
||||
"value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -45,7 +45,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
63
CVE-2025/CVE-2025-529xx/CVE-2025-52969.json
Normal file
63
CVE-2025/CVE-2025-529xx/CVE-2025-52969.json
Normal file
@ -0,0 +1,63 @@
|
||||
{
|
||||
"id": "CVE-2025-52969",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-23T17:15:31.137",
|
||||
"lastModified": "2025-06-23T17:15:31.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ClickHouse 25.7.1.557 allows low-privileged users to execute shell commands by querying existing Executable() tables created by higher-privileged users. Although the CREATE TABLE privilege is restricted, there is no access control preventing low-privileged users from invoking Executable tables already present in the system. If an attacker can influence the contents of the script referenced by the Executable() engine through writable paths, they may execute controlled commands in the context of the ClickHouse server, leading to privilege escalation and unauthorized code execution. NOTE: the Supplier's position is that these types of executions by low-privileged users are the expected behavior."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
|
||||
"baseScore": 2.8,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-420"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/skraft9/clickhouse-security-research",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6353",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T17:15:41.737",
|
||||
"lastModified": "2025-06-20T17:15:41.737",
|
||||
"lastModified": "2025-06-23T16:15:28.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as problematic was found in code-projects Responsive Blog 1.0. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en code-projects Responsive Blog 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search.php. La manipulaci\u00f3n de la palabra clave \"argument\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -144,6 +148,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597260",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/asd1238525/cve/blob/main/xss2.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6354",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T17:15:41.977",
|
||||
"lastModified": "2025-06-20T17:15:41.977",
|
||||
"lastModified": "2025-06-23T16:15:28.183",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/customer_signup.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a una funcionalidad desconocida del archivo /function/customer_signup.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597283",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/AlbaDove/cve/issues/1",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6355",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T17:15:42.217",
|
||||
"lastModified": "2025-06-20T17:15:42.217",
|
||||
"lastModified": "2025-06-23T16:15:28.320",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in SourceCodester Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execeditroom.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en SourceCodester Online Hotel Reservation System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/execeditroom.php. La manipulaci\u00f3n del argumento `userid` provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://www.sourcecodester.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/15",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6356",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T18:15:29.280",
|
||||
"lastModified": "2025-06-20T18:15:29.280",
|
||||
"lastModified": "2025-06-23T16:15:28.447",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /addmem.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /addmem.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597297",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/14",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6358",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T18:15:29.660",
|
||||
"lastModified": "2025-06-20T18:15:29.660",
|
||||
"lastModified": "2025-06-23T16:15:28.577",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /saveorder.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /saveorder.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597299",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/12",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6359",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T19:15:37.803",
|
||||
"lastModified": "2025-06-20T19:15:37.803",
|
||||
"lastModified": "2025-06-23T16:15:28.707",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cashconfirm.php. The manipulation of the argument transactioncode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /cashconfirm.php. La manipulaci\u00f3n del argumento transactioncode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. "
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597300",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/11",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6363",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T20:15:35.003",
|
||||
"lastModified": "2025-06-20T20:15:35.003",
|
||||
"lastModified": "2025-06-23T16:15:28.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /adding-exec.php. The manipulation of the argument ingname leads to sql injection. It is possible to launch the attack remotely."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Simple Pizza Ordering System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /adding-exec.php. La manipulaci\u00f3n del argumento ingname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597304",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/7",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6364",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T21:15:22.957",
|
||||
"lastModified": "2025-06-20T21:15:22.957",
|
||||
"lastModified": "2025-06-23T16:15:28.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adduser-exec.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se ha detectado una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /adduser-exec.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -140,6 +144,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597305",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/rom4j/cve/issues/6",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,17 @@
|
||||
"id": "CVE-2025-6365",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T21:15:23.140",
|
||||
"lastModified": "2025-06-20T21:15:23.140",
|
||||
"lastModified": "2025-06-23T16:15:29.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in HobbesOSR Kitten up to c4f8b7c3158983d1020af432be1b417b28686736 and classified as critical. Affected by this issue is the function set_pte_at in the library /include/arch-arm64/pgtable.h. The manipulation leads to resource consumption. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en HobbesOSR Kitten hasta c4f8b7c3158983d1020af432be1b417b28686736, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n set_pte_at de la librer\u00eda /include/arch-arm64/pgtable.h. Esta manipulaci\u00f3n consume recursos. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -59,7 +63,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
|
||||
@ -107,7 +111,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -136,6 +140,10 @@
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.597382",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/HobbesOSR/kitten/issues/17",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6367",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T21:15:23.327",
|
||||
"lastModified": "2025-06-20T21:15:23.327",
|
||||
"lastModified": "2025-06-23T16:15:29.233",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-619L 2.06B01. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/formSetDomainFilter. La manipulaci\u00f3n del argumento curTime/sched_name_%d/url_%d provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -147,6 +151,10 @@
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-6372",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-20T23:15:20.077",
|
||||
"lastModified": "2025-06-20T23:15:20.077",
|
||||
"lastModified": "2025-06-23T16:15:29.363",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
@ -16,6 +16,10 @@
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formSetWizard1 of the file /goform/formSetWizard1. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L 2.06B01. Esta afecta a la funci\u00f3n formSetWizard1 del archivo /goform/formSetWizard1. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
@ -66,7 +70,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
@ -114,7 +118,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
@ -147,6 +151,10 @@
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6509.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6509.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6509",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-23T16:15:29.560",
|
||||
"lastModified": "2025-06-23T16:15:29.560",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71. It has been declared as problematic. Affected by this vulnerability is the function echo of the file /src/main/java/controller/SimpleController.java. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 3.5,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
|
||||
"baseScore": 4.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md#steps-to-reproduce",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313621",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313621",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592962",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2025/CVE-2025-65xx/CVE-2025-6510.json
Normal file
153
CVE-2025/CVE-2025-65xx/CVE-2025-6510.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-6510",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-23T16:15:29.770",
|
||||
"lastModified": "2025-06-23T16:15:29.770",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated as critical. Affected by this issue is the function sub_415EF8. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313622",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313622",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593678",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.595995",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.netgear.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2025/CVE-2025-65xx/CVE-2025-6511.json
Normal file
153
CVE-2025/CVE-2025-65xx/CVE-2025-6511.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-6511",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-23T17:15:32.347",
|
||||
"lastModified": "2025-06-23T17:15:32.347",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313623",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313623",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.595999",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.596008",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.netgear.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-65xx/CVE-2025-6516.json
Normal file
145
CVE-2025/CVE-2025-65xx/CVE-2025-6516.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6516",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-23T17:15:32.550",
|
||||
"lastModified": "2025-06-23T17:15:32.550",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 4.3,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/HDFGroup/hdf5/issues/5581",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.313636",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.313636",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592589",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
86
README.md
86
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-23T16:00:28.688260+00:00
|
||||
2025-06-23T18:00:26.982876+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-23T15:25:05.683000+00:00
|
||||
2025-06-23T17:15:32.550000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,59 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
299091
|
||||
299102
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `11`
|
||||
|
||||
- [CVE-2023-47297](CVE-2023/CVE-2023-472xx/CVE-2023-47297.json) (`2025-06-23T15:15:25.940`)
|
||||
- [CVE-2023-47298](CVE-2023/CVE-2023-472xx/CVE-2023-47298.json) (`2025-06-23T15:15:26.700`)
|
||||
- [CVE-2023-48978](CVE-2023/CVE-2023-489xx/CVE-2023-48978.json) (`2025-06-23T15:15:26.890`)
|
||||
- [CVE-2025-2171](CVE-2025/CVE-2025-21xx/CVE-2025-2171.json) (`2025-06-23T14:15:26.437`)
|
||||
- [CVE-2025-2172](CVE-2025/CVE-2025-21xx/CVE-2025-2172.json) (`2025-06-23T14:15:26.607`)
|
||||
- [CVE-2025-46101](CVE-2025/CVE-2025-461xx/CVE-2025-46101.json) (`2025-06-23T15:15:27.793`)
|
||||
- [CVE-2025-48700](CVE-2025/CVE-2025-487xx/CVE-2025-48700.json) (`2025-06-23T15:15:27.930`)
|
||||
- [CVE-2025-52542](CVE-2025/CVE-2025-525xx/CVE-2025-52542.json) (`2025-06-23T14:15:26.753`)
|
||||
- [CVE-2025-52875](CVE-2025/CVE-2025-528xx/CVE-2025-52875.json) (`2025-06-23T15:15:28.260`)
|
||||
- [CVE-2025-52876](CVE-2025/CVE-2025-528xx/CVE-2025-52876.json) (`2025-06-23T15:15:28.447`)
|
||||
- [CVE-2025-52877](CVE-2025/CVE-2025-528xx/CVE-2025-52877.json) (`2025-06-23T15:15:28.603`)
|
||||
- [CVE-2025-52878](CVE-2025/CVE-2025-528xx/CVE-2025-52878.json) (`2025-06-23T15:15:28.770`)
|
||||
- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-23T15:15:28.933`)
|
||||
- [CVE-2025-52967](CVE-2025/CVE-2025-529xx/CVE-2025-52967.json) (`2025-06-23T15:15:29.163`)
|
||||
- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T15:15:29.350`)
|
||||
- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-23T17:15:27.313`)
|
||||
- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-23T16:15:23.920`)
|
||||
- [CVE-2023-47294](CVE-2023/CVE-2023-472xx/CVE-2023-47294.json) (`2025-06-23T16:15:24.493`)
|
||||
- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-23T16:15:24.623`)
|
||||
- [CVE-2023-50450](CVE-2023/CVE-2023-504xx/CVE-2023-50450.json) (`2025-06-23T16:15:24.743`)
|
||||
- [CVE-2025-4563](CVE-2025/CVE-2025-45xx/CVE-2025-4563.json) (`2025-06-23T16:15:27.350`)
|
||||
- [CVE-2025-52969](CVE-2025/CVE-2025-529xx/CVE-2025-52969.json) (`2025-06-23T17:15:31.137`)
|
||||
- [CVE-2025-6509](CVE-2025/CVE-2025-65xx/CVE-2025-6509.json) (`2025-06-23T16:15:29.560`)
|
||||
- [CVE-2025-6510](CVE-2025/CVE-2025-65xx/CVE-2025-6510.json) (`2025-06-23T16:15:29.770`)
|
||||
- [CVE-2025-6511](CVE-2025/CVE-2025-65xx/CVE-2025-6511.json) (`2025-06-23T17:15:32.347`)
|
||||
- [CVE-2025-6516](CVE-2025/CVE-2025-65xx/CVE-2025-6516.json) (`2025-06-23T17:15:32.550`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `95`
|
||||
Recently modified CVEs: `27`
|
||||
|
||||
- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-23T15:15:31.280`)
|
||||
- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-23T15:15:31.400`)
|
||||
- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-23T15:15:31.527`)
|
||||
- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-23T15:15:31.657`)
|
||||
- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-23T15:15:31.800`)
|
||||
- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-23T15:15:31.930`)
|
||||
- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-23T15:15:32.057`)
|
||||
- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-23T15:15:32.183`)
|
||||
- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-23T15:15:32.307`)
|
||||
- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-23T15:15:32.433`)
|
||||
- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-23T15:15:32.560`)
|
||||
- [CVE-2025-6421](CVE-2025/CVE-2025-64xx/CVE-2025-6421.json) (`2025-06-23T15:15:32.680`)
|
||||
- [CVE-2025-6452](CVE-2025/CVE-2025-64xx/CVE-2025-6452.json) (`2025-06-23T15:15:32.813`)
|
||||
- [CVE-2025-6453](CVE-2025/CVE-2025-64xx/CVE-2025-6453.json) (`2025-06-23T15:15:32.937`)
|
||||
- [CVE-2025-6455](CVE-2025/CVE-2025-64xx/CVE-2025-6455.json) (`2025-06-23T15:15:33.073`)
|
||||
- [CVE-2025-6456](CVE-2025/CVE-2025-64xx/CVE-2025-6456.json) (`2025-06-23T15:15:33.230`)
|
||||
- [CVE-2025-6457](CVE-2025/CVE-2025-64xx/CVE-2025-6457.json) (`2025-06-23T15:15:33.357`)
|
||||
- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-23T15:15:33.497`)
|
||||
- [CVE-2025-6466](CVE-2025/CVE-2025-64xx/CVE-2025-6466.json) (`2025-06-23T15:15:34.440`)
|
||||
- [CVE-2025-6467](CVE-2025/CVE-2025-64xx/CVE-2025-6467.json) (`2025-06-23T14:15:27.473`)
|
||||
- [CVE-2025-6477](CVE-2025/CVE-2025-64xx/CVE-2025-6477.json) (`2025-06-23T14:15:28.330`)
|
||||
- [CVE-2025-6498](CVE-2025/CVE-2025-64xx/CVE-2025-6498.json) (`2025-06-23T14:15:28.950`)
|
||||
- [CVE-2025-6499](CVE-2025/CVE-2025-64xx/CVE-2025-6499.json) (`2025-06-23T14:15:29.077`)
|
||||
- [CVE-2025-6500](CVE-2025/CVE-2025-65xx/CVE-2025-6500.json) (`2025-06-23T14:15:29.207`)
|
||||
- [CVE-2025-6501](CVE-2025/CVE-2025-65xx/CVE-2025-6501.json) (`2025-06-23T14:15:29.337`)
|
||||
- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`)
|
||||
- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`)
|
||||
- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`)
|
||||
- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`)
|
||||
- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`)
|
||||
- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`)
|
||||
- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`)
|
||||
- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`)
|
||||
- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`)
|
||||
- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`)
|
||||
- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`)
|
||||
- [CVE-2025-43947](CVE-2025/CVE-2025-439xx/CVE-2025-43947.json) (`2025-04-23T14:08:13.383`)
|
||||
- [CVE-2025-50054](CVE-2025/CVE-2025-500xx/CVE-2025-50054.json) (`2025-06-20T07:15:26.367`)
|
||||
- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T17:15:30.990`)
|
||||
- [CVE-2025-6353](CVE-2025/CVE-2025-63xx/CVE-2025-6353.json) (`2025-06-23T16:15:28.043`)
|
||||
- [CVE-2025-6354](CVE-2025/CVE-2025-63xx/CVE-2025-6354.json) (`2025-06-23T16:15:28.183`)
|
||||
- [CVE-2025-6355](CVE-2025/CVE-2025-63xx/CVE-2025-6355.json) (`2025-06-23T16:15:28.320`)
|
||||
- [CVE-2025-6356](CVE-2025/CVE-2025-63xx/CVE-2025-6356.json) (`2025-06-23T16:15:28.447`)
|
||||
- [CVE-2025-6358](CVE-2025/CVE-2025-63xx/CVE-2025-6358.json) (`2025-06-23T16:15:28.577`)
|
||||
- [CVE-2025-6359](CVE-2025/CVE-2025-63xx/CVE-2025-6359.json) (`2025-06-23T16:15:28.707`)
|
||||
- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-06-23T16:15:28.830`)
|
||||
- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-23T16:15:28.960`)
|
||||
- [CVE-2025-6365](CVE-2025/CVE-2025-63xx/CVE-2025-6365.json) (`2025-06-23T16:15:29.093`)
|
||||
- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-23T16:15:29.233`)
|
||||
- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-23T16:15:29.363`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
281
_state.csv
281
_state.csv
@ -138435,7 +138435,7 @@ CVE-2019-2479,0,0,e0c7a602157a3a3233e2924456cab0b3e874e1a14c59e46b40d40a581b865b
|
||||
CVE-2019-2480,0,0,6eea42436df236a96df3c2182dde88be080c2d91d3678fb57a7c2f7ad95e7702,2024-11-21T04:40:57.403000
|
||||
CVE-2019-2481,0,0,2c7f842fe90c4c9c7c6cf8044eaff1b070218ab2ebd7b7b65afbfc4acbbc5150,2024-11-21T04:40:57.523000
|
||||
CVE-2019-2482,0,0,60afa5b90bf8c3578bc6106e4f975267fcbb563b3067e9521d1bdccda2a87afd,2024-11-21T04:40:57.660000
|
||||
CVE-2019-2483,0,1,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000
|
||||
CVE-2019-2483,0,0,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000
|
||||
CVE-2019-2484,0,0,a7715493c3547f6d9e809f816d1813c2921c76b2c7dc1546f30b1b68849ed9de,2024-11-21T04:40:57.780000
|
||||
CVE-2019-2485,0,0,76d018af106f8af9fdc20711cbfe38a23bc7f9c5c4b44cb18c66175ee6e482c3,2024-11-21T04:40:57.893000
|
||||
CVE-2019-2486,0,0,4d94fca994706eacfa9aa52f25dc23c95c1e49d831e7a7b89436c2cc7cb6710b,2024-11-21T04:40:58.017000
|
||||
@ -237901,6 +237901,8 @@ CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620
|
||||
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
|
||||
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
|
||||
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
|
||||
CVE-2023-47031,1,1,a8e93fd51520b4974986e0b69c7c4ddc9e00a730f0784dd85cdf7e2d377ab9fe,2025-06-23T17:15:27.313000
|
||||
CVE-2023-47032,1,1,88713d4ca136a466d014f7b97f26f67b61fc67d85e63960eae1c5bf38e727a10,2025-06-23T16:15:23.920000
|
||||
CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000
|
||||
CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000
|
||||
CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000
|
||||
@ -238131,8 +238133,10 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
|
||||
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
|
||||
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
|
||||
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
|
||||
CVE-2023-47297,1,1,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000
|
||||
CVE-2023-47298,1,1,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000
|
||||
CVE-2023-47294,1,1,d8554dad4af058ac7998498e3eedba8cdbc3a03f6ba24980226a84f041a77ee1,2025-06-23T16:15:24.493000
|
||||
CVE-2023-47295,1,1,c0f92ae71b07a596eeb84a282b19c906d3be5203af9c2dd26e2f399bd7b5deb9,2025-06-23T16:15:24.623000
|
||||
CVE-2023-47297,0,0,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000
|
||||
CVE-2023-47298,0,0,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000
|
||||
CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000
|
||||
CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000
|
||||
CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b8777e,2024-11-21T08:30:07.700000
|
||||
@ -239415,7 +239419,7 @@ CVE-2023-48966,0,0,c88c2027c13e6fd2aaa41bb08a633ab1482cdd3b1061751f9ee7fc5ae02c4
|
||||
CVE-2023-48967,0,0,1cd351e34d0367ca1f2c697aa81b0efac29357ca75fe471f5d64e2558fda969d,2024-11-21T08:32:40.463000
|
||||
CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b6943d,2024-11-21T08:36:12.803000
|
||||
CVE-2023-48974,0,0,e5c2b099db521bf37d9fbf8a5d47d0a5c7f75b442894bf87ae88502412b1de09,2025-06-17T16:15:24.747000
|
||||
CVE-2023-48978,1,1,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000
|
||||
CVE-2023-48978,0,0,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000
|
||||
CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000
|
||||
CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000
|
||||
CVE-2023-48986,0,0,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000
|
||||
@ -240470,6 +240474,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01
|
||||
CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000
|
||||
CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000
|
||||
CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000
|
||||
CVE-2023-50450,1,1,867f50ca34f4d8ba1ae4eaf000c11978a0190ed0a8351ab251387cb32cfdee12,2025-06-23T16:15:24.743000
|
||||
CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000
|
||||
CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000
|
||||
CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000
|
||||
@ -251102,7 +251107,7 @@ CVE-2024-21202,0,0,a82724b3e343bc702e27e8d6ce800a916f4b3f0e013f2e090965b5628d482
|
||||
CVE-2024-21203,0,0,479844f4f758f4b28553f6669f6d21014910b665e890542aa411088e0f38c63f,2025-03-13T14:15:21.097000
|
||||
CVE-2024-21204,0,0,6e02d97c4802b20054f3c4f36b4262d4579d51c4dad414b899b7f47595986f74,2025-03-13T17:15:27.480000
|
||||
CVE-2024-21205,0,0,e1826db3e18237be6dde03d7d4cc539b869d1360faa558be8561f743abd88176,2025-03-13T14:15:21.243000
|
||||
CVE-2024-21206,0,1,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000
|
||||
CVE-2024-21206,0,0,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000
|
||||
CVE-2024-21207,0,0,8943a78a85322e8f74ca9bb8757d973fc6062abdbe462a9e329a926ce38d871e,2025-03-13T14:15:21.393000
|
||||
CVE-2024-21208,0,0,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000
|
||||
CVE-2024-21209,0,0,9f9125b2f59e97ee383b40b643ff87dbadc96541830a9dd6f1bb5908b73c9c56,2025-03-13T16:15:15.907000
|
||||
@ -252359,7 +252364,7 @@ CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69
|
||||
CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
|
||||
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
|
||||
CVE-2024-22653,0,0,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000
|
||||
CVE-2024-22654,0,1,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000
|
||||
CVE-2024-22654,0,0,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000
|
||||
CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000
|
||||
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
|
||||
CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000
|
||||
@ -267710,7 +267715,7 @@ CVE-2024-42556,0,0,ac1b4152bf99bca20ae35623d62f61452a39fb306fbbee858a0a5374f0e4f
|
||||
CVE-2024-42557,0,0,b692a3b0466194a416876ee66549e1bd8b2c7e51a5c1228110019b0c078e3135,2025-06-05T20:18:43.920000
|
||||
CVE-2024-42558,0,0,ddd5492e2b52bc68def78917541ff4f0fd5129fe9226419b3f94cbbe242b143c,2025-06-05T20:18:30.253000
|
||||
CVE-2024-42559,0,0,f7187969dab6ad6558e1754351d11efdd6752164963d45cc6208ae6834946dcc,2024-08-20T19:35:10.850000
|
||||
CVE-2024-4256,0,1,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000
|
||||
CVE-2024-4256,0,0,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000
|
||||
CVE-2024-42560,0,0,d8e63dfccffe358d8f5f12e10d5c3bdb3d80b3adec563f71c08b10512ad5a438,2025-06-05T20:18:17.887000
|
||||
CVE-2024-42561,0,0,d70955b1d40eb54377d8e12e382907c01dc23b672669cb749222161095d7676d,2025-06-05T20:18:01.470000
|
||||
CVE-2024-42562,0,0,4d5f095c6cbd840b865bd2919364e7e80c3562dd9684dd1b1a5a56be9c16cd36,2025-06-05T20:17:49.820000
|
||||
@ -269713,7 +269718,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6
|
||||
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
|
||||
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
|
||||
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
|
||||
CVE-2024-45208,0,0,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000
|
||||
CVE-2024-45208,0,1,256de394a286effeb23e2b86009f8754ccf8a94ed80f865cd5be862bae035361,2025-06-19T00:15:21.097000
|
||||
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
|
||||
CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000
|
||||
CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000
|
||||
@ -272196,7 +272201,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf
|
||||
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
|
||||
CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000
|
||||
CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000
|
||||
CVE-2024-48766,0,1,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000
|
||||
CVE-2024-48766,0,0,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000
|
||||
CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000
|
||||
CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000
|
||||
CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000
|
||||
@ -274368,7 +274373,7 @@ CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3
|
||||
CVE-2024-51532,0,0,2d809e858826663dfe9250848bf54d1d67a303ccaea30e096202fdbcd858496e,2025-01-29T21:06:51.663000
|
||||
CVE-2024-51534,0,0,119c8ca4d836cf97fc773cbb645e954f693ae364266f1264b856ae256ade04e3,2025-02-07T19:58:25.567000
|
||||
CVE-2024-51539,0,0,b1af50f63ad59511e4a92be40db02a7d120fd35939f783b0ad1dc1ad8e6b0102,2025-02-25T14:15:31.153000
|
||||
CVE-2024-5154,0,1,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000
|
||||
CVE-2024-5154,0,0,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000
|
||||
CVE-2024-51540,0,0,96d82dbba2ebe404a1a2ea6174b3264f3b486447b0ab540d34ad70a82a5fc066,2025-01-21T21:30:52.310000
|
||||
CVE-2024-51541,0,0,6701a109dfadee0bf9df2ae076263677d2273867a4cd8d4999c49830cdf3286f,2025-02-27T17:18:41.483000
|
||||
CVE-2024-51542,0,0,51af5b7f493e16046a0353b6dff1f03aa6634aedd1a41c0133f8ad01785b2f85,2025-04-10T19:42:05.967000
|
||||
@ -274780,7 +274785,7 @@ CVE-2024-51926,0,0,3af7d3be4c078e7a2de285bfa5deb879d2e999b541df90a9975702e0878d6
|
||||
CVE-2024-51927,0,0,106ca5e27a288e356fd6a7e911b64c6dfd5b7ba7258e70ff09080ea37925fb43,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51928,0,0,906f674464392bc223ac1e1b1f01be2b3080856baabf09c25d67edd7c45b67c3,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51929,0,0,cb4911d106197ddce6c702f19e318e44410a8bbb68de3fb535dfd76509b3dbdb,2024-11-19T21:56:45.533000
|
||||
CVE-2024-5193,0,1,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000
|
||||
CVE-2024-5193,0,0,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000
|
||||
CVE-2024-51930,0,0,6a6f30179b2f818a5fbde14015f3085c671c58bd758c9148a860135e38246cda,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51931,0,0,f1806da64751fc947a9be6b715414a5533bb8bd4b1043efa5b37487df572a9bc,2024-11-19T21:56:45.533000
|
||||
CVE-2024-51932,0,0,55673a62a416277babc704dc3092cc11640b7d2ab527b4db9563155a69c67e6a,2024-11-19T21:56:45.533000
|
||||
@ -276840,7 +276845,7 @@ CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12
|
||||
CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000
|
||||
CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000
|
||||
CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000
|
||||
CVE-2024-54779,0,1,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000
|
||||
CVE-2024-54779,0,0,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000
|
||||
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
|
||||
CVE-2024-54780,0,0,97aeac9148437d0ba8a5fd67ab0a34cd99c35df10abeb3e7cb7208a15fc9f6c4,2025-06-13T13:03:51.367000
|
||||
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
|
||||
@ -278231,7 +278236,7 @@ CVE-2024-57261,0,0,26a9b2d5b7ff5b622e87fcd3863f1f802b79a7b6bbd571d956e44c1603185
|
||||
CVE-2024-57262,0,0,9fe2f40763eda4120983592ae7a5e38429477dc711d137d5de6a923fed11e57b,2025-02-19T02:15:08.677000
|
||||
CVE-2024-5727,0,0,fa88f56a97866359bbc0b65df783d5b0244efde0cef8aa399c3e096ccc969a63,2025-05-19T20:47:23.443000
|
||||
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
|
||||
CVE-2024-57273,0,1,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000
|
||||
CVE-2024-57273,0,0,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000
|
||||
CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000
|
||||
CVE-2024-57277,0,0,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000
|
||||
CVE-2024-57278,0,0,5802b511c82f2f71ef9a786cc45e5ccdffc451e02dca104a266adf57fe298a49,2025-02-07T23:15:14.230000
|
||||
@ -281379,7 +281384,7 @@ CVE-2024-8519,0,0,6d09c03bb5c0676e2db6d7de8b2d6bfb1c8c549009d82d08f9b45ce64c552e
|
||||
CVE-2024-8520,0,0,ee5e313bdd2082e7ac0347f97a4f567f3e181986d8d2c028c9afe06673efefeb,2024-10-08T21:50:30.153000
|
||||
CVE-2024-8521,0,0,f9b371241b659e5641a68121d0175d4d79935b6aa87350515395e868afaa92d1,2025-06-04T16:56:10.697000
|
||||
CVE-2024-8522,0,0,3ac21e73fb1c10b4b5ed0e52a198a17bd9ec825a9c6d4ed8383caff4ddd53d99,2024-09-13T16:12:30.497000
|
||||
CVE-2024-8523,0,1,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000
|
||||
CVE-2024-8523,0,0,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000
|
||||
CVE-2024-8524,0,0,33b79bd5f5f8b1f6caea1361e2709fb9f6e9ffdb86bbfb1fd17fb49f4b2255d5,2025-04-01T20:31:52.367000
|
||||
CVE-2024-8525,0,0,e40fe06cb9d6da5dea832197d70784a726c2e86485a80664114babe1f94175e1,2024-11-21T16:15:27.217000
|
||||
CVE-2024-8526,0,0,87a88335b350126bc897aa9b90f3452321356859016838db3ea06327abc68688,2024-11-21T16:15:27.437000
|
||||
@ -283835,7 +283840,7 @@ CVE-2025-1373,0,0,77cfaa3a6771902b072de962115d7552a47b140ae8333a2256741e5279e5fe
|
||||
CVE-2025-1374,0,0,cadb80f4dd4c990bddb9a04d1d5b86061bf8cb9c94d8d0e9a8e4622fd190d028,2025-02-24T12:39:38.450000
|
||||
CVE-2025-1376,0,0,2b2b61cbe13de588e58e77dbd2d6ba8599c2b392d8f7811bef18ce22646e2214,2025-02-17T05:15:09.807000
|
||||
CVE-2025-1377,0,0,19be1f82dafea985fb389f6935710bf6fb3889bba10c10bc1ad76bf361c5c361,2025-02-17T05:15:10.090000
|
||||
CVE-2025-1378,0,1,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000
|
||||
CVE-2025-1378,0,0,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000
|
||||
CVE-2025-1379,0,0,5dcb3165f40d5545ed4ce19a6009cd3b7b7246346d15ef8a292528f915f8199d,2025-04-02T18:44:42.610000
|
||||
CVE-2025-1380,0,0,6bd04dd2008ea0079e8919e2e53c4972b6e83c3f4c56a4b8715e29739c2e265b,2025-04-02T19:01:09.913000
|
||||
CVE-2025-1381,0,0,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000
|
||||
@ -284287,7 +284292,7 @@ CVE-2025-1920,0,0,fe1bfe7d3968a4bee0153a90d7c96939434eef45f8e8313d77416606c59a2b
|
||||
CVE-2025-1921,0,0,ba74c018bcf5faf8a06ccf49ccb3d218a4283defa0404c6fedf537f78ae8c0db,2025-04-01T20:42:02.037000
|
||||
CVE-2025-1922,0,0,ffe3afa46e41291810fea1180110899b162ac00bfd72f4ed17aed7281078e346,2025-04-01T20:41:48.893000
|
||||
CVE-2025-1923,0,0,6582409071430538ff195b4cf1ccfbfda63320893f755839ae619a5289f82d8c,2025-04-01T20:41:40.067000
|
||||
CVE-2025-1925,0,1,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000
|
||||
CVE-2025-1925,0,0,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000
|
||||
CVE-2025-1926,0,0,4221b375af30e7037e93f37efe9c0a6378338767f4a8a8f0236af0d6a028f3db,2025-05-26T02:32:26.917000
|
||||
CVE-2025-1930,0,0,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000
|
||||
CVE-2025-1931,0,0,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000
|
||||
@ -284497,7 +284502,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
|
||||
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
|
||||
CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000
|
||||
CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000
|
||||
CVE-2025-20188,0,1,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000
|
||||
CVE-2025-20188,0,0,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000
|
||||
CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000
|
||||
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
|
||||
CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000
|
||||
@ -285180,7 +285185,7 @@ CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b
|
||||
CVE-2025-21480,0,0,6948132d528c7804139999300020de3a6192ffe9f450494845d5e5c5a7c138cc,2025-06-04T17:24:26.927000
|
||||
CVE-2025-21485,0,0,03d83e3b9947fa20b8c4220c62d45e20f0436065a3a3d3554a8beeb69e71c0fa,2025-06-04T14:54:33.783000
|
||||
CVE-2025-21486,0,0,6657ae7f3cc111f37509795b42a9ee2f1a625afcb0e5375a7c1283ba109a4c1b,2025-06-04T14:54:33.783000
|
||||
CVE-2025-21489,0,1,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000
|
||||
CVE-2025-21489,0,0,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000
|
||||
CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000
|
||||
CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000
|
||||
CVE-2025-21491,0,0,4c71536c040f797c835de923bbd00b182f1ac6ab6a1fff2e0c1acd32c2e0881a,2025-04-09T16:07:09.130000
|
||||
@ -285198,7 +285203,7 @@ CVE-2025-21502,0,0,e609b91a197717b73d4133c8279c7e31d49feb54f8e96c78fcec879f0eb13
|
||||
CVE-2025-21503,0,0,c6621e1804e534da4b6f8af2b5c1b59b3c1bcd12c30ae31ad8d5fe188bdf3555,2025-04-09T16:04:21.040000
|
||||
CVE-2025-21504,0,0,bc881ca1fb7f096c2e016f923823b9a2470f1d2c468ee6287a81011b2db7263e,2025-04-09T16:02:55.010000
|
||||
CVE-2025-21505,0,0,f82b99d26e4784c08ee442698027f2b08d7f4b7e9565daea0fd24615c17f7a08,2025-04-09T16:03:07.740000
|
||||
CVE-2025-21506,0,1,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000
|
||||
CVE-2025-21506,0,0,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000
|
||||
CVE-2025-21507,0,0,007166eda0d37ec06452a45526793243e0fea8d62f479e18176e81c46b4337a3,2025-03-17T19:46:46.897000
|
||||
CVE-2025-21508,0,0,38aa46d6a476bca3579602fdfbd94ba2a9ddd3791de5357a8b647e31a8958f44,2025-03-17T19:47:09.393000
|
||||
CVE-2025-21509,0,0,78d11a80a54a729b734634d90323f7ce96e2b4cd9da9222a33edddf0250cb60d,2025-03-17T19:47:23.373000
|
||||
@ -285209,7 +285214,7 @@ CVE-2025-21512,0,0,b41dd68018c5ee645b589d1dc835b8f1b44209721493f0312f1786c09fc84
|
||||
CVE-2025-21513,0,0,3c86989aabb2a1abf9d935de5a183eb43828fa543d6b90f0a3a11729ad9dd767,2025-03-17T19:48:23.063000
|
||||
CVE-2025-21514,0,0,8f6143affc9f22c6886521c601abb0dc1d9ae0e636d6e6c6cd0ae89c6968aca6,2025-03-17T19:48:36.210000
|
||||
CVE-2025-21515,0,0,0828af27bcb9a16663a74195e55950d31ee556d7231c37d2d3137b27845ad264,2025-03-17T19:48:55.423000
|
||||
CVE-2025-21516,0,1,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000
|
||||
CVE-2025-21516,0,0,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000
|
||||
CVE-2025-21517,0,0,1086512bfae7e253f269aad4651607ad2b61c185f2d23e04b49b9b890b2708ec,2025-03-17T19:49:06.110000
|
||||
CVE-2025-21518,0,0,a3e730d8002ec29d3429831f974c1c6d7cfb47e29e96c89f068326fa8430be91,2025-04-09T16:03:17.900000
|
||||
CVE-2025-21519,0,0,bd99e2535abab66a9b94434ac3f5b4c912dacdf6748e95a236c4dafd8868bf6e,2025-04-09T16:03:28.280000
|
||||
@ -285228,24 +285233,24 @@ CVE-2025-2153,0,0,d1001c611eef70eb71a49d9fe459204d662bb89375cad643af202eb312828d
|
||||
CVE-2025-21530,0,0,b1a49e867472ba70a25f247af19b090d67ec55139a19152ce999713a4e79ac88,2025-05-07T20:05:11.573000
|
||||
CVE-2025-21531,0,0,5030ca0040f9a6018a6680d6e91134a4e5feb19b3e27dd86ec8b9c39f5a0e810,2025-04-08T20:53:44.180000
|
||||
CVE-2025-21532,0,0,ff62206288e1ce3e2eb346cc4f07db2099e0d4a0af5b22a41c25d9e7ed7c5c99,2025-03-18T20:15:25.563000
|
||||
CVE-2025-21533,0,1,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000
|
||||
CVE-2025-21533,0,0,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000
|
||||
CVE-2025-21534,0,0,f3e3bc44268f89c76af0200cd6217f2c6a3ac2379b1fb591b60edf404fd4115d,2025-04-08T20:53:53.383000
|
||||
CVE-2025-21535,0,1,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000
|
||||
CVE-2025-21535,0,0,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000
|
||||
CVE-2025-21536,0,0,b28639c212dac5fe3456f26bb9716d382e07a02dd29aec1a2f95f12a92391861,2025-04-08T20:53:58.330000
|
||||
CVE-2025-21537,0,0,f58f33954af15f700374ba4be972c7b059d34eb3fd460d41885ca0b87c9ecb94,2025-06-20T16:45:43.840000
|
||||
CVE-2025-21538,0,0,58939685b83171a2f0dbdefd4b15f8bbe50eb2d247ec0557417661152fcf2ef7,2025-03-17T19:49:44.330000
|
||||
CVE-2025-21539,0,0,8342d82994d74679b4efe1a9e7012563d4b762f0ca4e1d7f1da81ff6370349e2,2025-06-20T16:56:56.333000
|
||||
CVE-2025-21540,0,0,5c0fc7a5663922f24325b74a7fb831d5b624b90b2a1de956bce68058ecbf8e1e,2025-04-08T20:12:26.263000
|
||||
CVE-2025-21541,0,1,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000
|
||||
CVE-2025-21541,0,0,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000
|
||||
CVE-2025-21542,0,0,3a52bdb4139f482b37a35bf074f2329800b6e986f65ea89f862e8d92838cda61,2025-06-20T16:57:56.907000
|
||||
CVE-2025-21543,0,0,1e4da3260b0f2a0de189ddd7aeb40c7f66c75cf9aa4d7a2bd7414442b02ba8a3,2025-04-08T20:13:35.230000
|
||||
CVE-2025-21544,0,0,8e6235c2828cdd2783c06437e71f4dae7aa335264d892f772c25be6f01aabde7,2025-06-20T16:58:04.887000
|
||||
CVE-2025-21545,0,0,8e72a18fadb3251721734a26ad9eb23dfd0f940d095f541002bdc57daf18ec8e,2025-05-07T20:04:23.117000
|
||||
CVE-2025-21546,0,0,b82f3e380622b9a05860422ffd272d7a27cd1f165e5094c53eda87f473ce924a,2025-04-08T20:14:45.287000
|
||||
CVE-2025-21547,0,1,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000
|
||||
CVE-2025-21547,0,0,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000
|
||||
CVE-2025-21548,0,0,606a21c57ea081be937bfbc67e5b25b8530acf17f17fc0109687613859fc2d3d,2025-06-18T19:24:16.277000
|
||||
CVE-2025-21549,0,1,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000
|
||||
CVE-2025-21550,0,1,92017aa77ae6c95a423070eda1c8df32559a69c0bcdda4df962784b46c563c81,2025-06-23T15:25:05.683000
|
||||
CVE-2025-21549,0,0,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000
|
||||
CVE-2025-21550,0,1,f923d248ff899007602102b6ca7e933a44ea28f7e5ba26f26c6f5b73ed8e5a32,2025-03-13T15:15:51.980000
|
||||
CVE-2025-21551,0,0,b673da22cf5f8a5606180b66209828b12e63cef230313032db77a47e1a7f3e59,2025-05-07T20:04:11.897000
|
||||
CVE-2025-21552,0,0,7ecce434a919c478959a0e1087c69e67e36ea612972e1b51c4e646beee5c29e9,2025-03-13T15:15:52.237000
|
||||
CVE-2025-21553,0,0,92802bf9739837fa0d2c62514ebaef4b18196a11ad6b61143f1fb0c046ffa5cc,2025-02-04T16:15:41.797000
|
||||
@ -285417,7 +285422,7 @@ CVE-2025-21706,0,0,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e61499
|
||||
CVE-2025-21707,0,0,b9a0ead8603132ae8c9b4545a9ad4ef804e9617616abc14068f03d0615379a18,2025-03-13T13:15:49.053000
|
||||
CVE-2025-21708,0,0,180375921d7ace222b11f8ec59581e85e27778345c37b4ab9b4b71ce18a0a587,2025-03-13T13:15:49.207000
|
||||
CVE-2025-21709,0,0,a14e7b079991c2dff834a4c134806b146fad3426c8ee00bb7e36d413c6c5e076,2025-02-27T02:15:14.560000
|
||||
CVE-2025-2171,1,1,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000
|
||||
CVE-2025-2171,0,0,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000
|
||||
CVE-2025-21710,0,0,7d577fdeeae7df2e8f9e47f3e4aa9e890b8b043c8f557f4e9316ece7be82aa42,2025-02-27T02:15:14.657000
|
||||
CVE-2025-21711,0,0,e6c14c8d6127b841cd40a6c73bdb0db683cc2793b219532fa0c9bbe5155e4a77,2025-03-13T13:15:49.343000
|
||||
CVE-2025-21712,0,0,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000
|
||||
@ -285428,7 +285433,7 @@ CVE-2025-21716,0,0,549d7591deeaa155c202289561e5593a5a85c8ded4d1431847a10528b2e8e
|
||||
CVE-2025-21717,0,0,75c35fa7fba42e24f73abff9b53b1952419e1ddad8d4143bf10c80475ee6ece3,2025-02-27T02:15:15.373000
|
||||
CVE-2025-21718,0,0,2520ef1afcdc46478f313a5a92354d6fb20effaff260f2b5b7d82b998895b4eb,2025-03-13T13:15:49.760000
|
||||
CVE-2025-21719,0,0,f615c6b22a70cd4a20e7b0424d01a8a7ad6c045d5c2c11aca0dcb25e7b3a77c2,2025-03-13T13:15:49.913000
|
||||
CVE-2025-2172,1,1,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000
|
||||
CVE-2025-2172,0,0,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000
|
||||
CVE-2025-21720,0,0,0a0c8dead69b88fdb48e05feff8e64e2e34f9199f277d44d9b715abac576f042,2025-02-27T02:15:15.683000
|
||||
CVE-2025-21721,0,0,cb718b259efff33aef42e06dc10e923ca6afb1c706aa2b3e33501228c041fbd6,2025-03-13T13:15:50.060000
|
||||
CVE-2025-21722,0,0,072d53056ce905d076e5c84d30643f7bbfa8ee92227d7718c69ee109f330f3e1,2025-03-24T18:27:47.437000
|
||||
@ -286698,7 +286703,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8
|
||||
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
|
||||
CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000
|
||||
CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000
|
||||
CVE-2025-23121,0,0,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000
|
||||
CVE-2025-23121,0,1,5a5c46c9dbf65791f2e2637d8b8bf18cc2e8a78929cdf524a4840e0ea5e49210,2025-06-19T00:15:21.260000
|
||||
CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000
|
||||
CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000
|
||||
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
|
||||
@ -286746,13 +286751,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81
|
||||
CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000
|
||||
CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000
|
||||
CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000
|
||||
CVE-2025-23168,0,0,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000
|
||||
CVE-2025-23169,0,0,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000
|
||||
CVE-2025-23168,0,1,8a7994089ec6385e522516bf2f536510085098ab8ffd833145f9cf8895224005,2025-06-19T00:15:21.377000
|
||||
CVE-2025-23169,0,1,fec4996f1a4a5562a715d0fac570ff9108e7ca433422b014e4068e2ec0bb358e,2025-06-19T00:15:21.497000
|
||||
CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000
|
||||
CVE-2025-23170,0,0,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000
|
||||
CVE-2025-23171,0,0,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000
|
||||
CVE-2025-23172,0,0,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000
|
||||
CVE-2025-23173,0,0,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000
|
||||
CVE-2025-23170,0,1,5b808da9b57d389379b1d0b1e0c53a07e1a17dd583bc4fe3eec454f691bb1345,2025-06-19T00:15:21.620000
|
||||
CVE-2025-23171,0,1,827b4248ccfe906d0f0742fd36a2ec1d16326b94ab077d1643894fcbe8936e6f,2025-06-19T00:15:21.743000
|
||||
CVE-2025-23172,0,1,8349294cda657892d33b9abaf6d3ea4aced4f1702b45ccbb9e881839ea2cafeb,2025-06-19T00:15:21.857000
|
||||
CVE-2025-23173,0,1,16e7e25ef7bfb6bb9349e599be7048658e67402e487b05b79cbdf70ddf5e83e2,2025-06-19T00:15:21.977000
|
||||
CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000
|
||||
CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000
|
||||
@ -287052,7 +287057,7 @@ CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf
|
||||
CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000
|
||||
CVE-2025-23568,0,0,541d6e4ad43f8dba765299393aac14407144d095e5c8f6fed5ce69f6ad16e1ea,2025-02-14T13:15:44.123000
|
||||
CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000
|
||||
CVE-2025-2357,0,1,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000
|
||||
CVE-2025-2357,0,0,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000
|
||||
CVE-2025-23570,0,0,c339e33fe57ee43e67044cf27eb7b67a55d9ba70ad791589ea878809139d8a71,2025-03-03T14:15:42.437000
|
||||
CVE-2025-23571,0,0,3c56bf3d57cf36665f942829237cdd5ae4a799e329add61ae4a156fa2555e187,2025-02-14T13:15:44.330000
|
||||
CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000
|
||||
@ -287772,10 +287777,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d
|
||||
CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000
|
||||
CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000
|
||||
CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000
|
||||
CVE-2025-24286,0,0,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000
|
||||
CVE-2025-24287,0,0,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000
|
||||
CVE-2025-24288,0,0,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000
|
||||
CVE-2025-24291,0,0,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000
|
||||
CVE-2025-24286,0,1,fd3fb7280d51fd2a71a111f451a2da4d293afb37dc62ff7a2a80c0cdf8ce2ea6,2025-06-19T00:15:22.093000
|
||||
CVE-2025-24287,0,1,ebc03adaff4ae5856e885bf441e46a17f37f0bac234cc982630d274eb758a579,2025-06-19T00:15:22.207000
|
||||
CVE-2025-24288,0,1,2fa6148fd47506eeeac6a7638be549b1e9bea9b3b9bfa376f4b50508c21bc50d,2025-06-19T00:15:22.323000
|
||||
CVE-2025-24291,0,1,7fd5d75bc01388d3c0c3423ad0eb3c07d7af10787121f31e51948e0aba26b8e7,2025-06-19T00:15:22.437000
|
||||
CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000
|
||||
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
|
||||
CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000
|
||||
@ -288729,7 +288734,7 @@ CVE-2025-25568,0,0,8bf6eccd897b3aef0c5b736978952194e590be79850ad050dceac1781eef8
|
||||
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
|
||||
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
|
||||
CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000
|
||||
CVE-2025-2558,0,1,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000
|
||||
CVE-2025-2558,0,0,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000
|
||||
CVE-2025-25580,0,0,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000
|
||||
CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000
|
||||
CVE-2025-25585,0,0,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000
|
||||
@ -289953,7 +289958,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4
|
||||
CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000
|
||||
CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000
|
||||
CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27531,0,1,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000
|
||||
CVE-2025-27531,0,0,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000
|
||||
CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000
|
||||
CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000
|
||||
CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000
|
||||
@ -290370,7 +290375,7 @@ CVE-2025-28380,0,0,c812077873aafe4be08d39ece96a4d97cd2f4df4a28357fdf5933a2f28611
|
||||
CVE-2025-28381,0,0,c29a1bab5aea9357924456ab747be9f25188b616f7afcf694fba4f682f8e5550,2025-06-17T19:09:45.910000
|
||||
CVE-2025-28382,0,0,b0e7ccf5d5a7ced7868f423fbff9e70580d3563f85b9762b991c87477aaa0c67,2025-06-17T19:29:21.273000
|
||||
CVE-2025-28384,0,0,040afa29fdc376ec47fa008bae4239a0570cc89b0355eff5bcb56a6a3b73be48,2025-06-17T19:31:52.810000
|
||||
CVE-2025-28386,0,1,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000
|
||||
CVE-2025-28386,0,0,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000
|
||||
CVE-2025-28388,0,0,1794bcba8ec3946381f378038b8ba673ba619f4324eae27560582f6f3438e967,2025-06-17T19:41:40.320000
|
||||
CVE-2025-28389,0,0,ac3d6d4614830ae5beed2b1a1a239f742425bde3a69256016d024e0949604b02,2025-06-17T19:42:06.507000
|
||||
CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000
|
||||
@ -293402,7 +293407,7 @@ CVE-2025-32870,0,0,9dfaf4968559e46a3335f01151ff3a08e8a477d9c61bda01559d6ee35cfa4
|
||||
CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b85e3,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000
|
||||
CVE-2025-32875,0,1,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000
|
||||
CVE-2025-32875,0,0,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000
|
||||
CVE-2025-32876,0,0,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000
|
||||
CVE-2025-32877,0,0,dd219aeeb9989d4c29173d23498e70d0a6a03ae3090a8b9918df11e455e331f0,2025-06-20T14:15:28.250000
|
||||
CVE-2025-32878,0,0,3879fa1faf01e446cb6e900199955a950befa6933404b3f997c1c9e54a599695,2025-06-20T15:15:20.257000
|
||||
@ -294858,7 +294863,7 @@ CVE-2025-4037,0,0,c2a9a7365cb7350487e335b4185abf1b7136e28443b7d38831abbd5f1a9ddf
|
||||
CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255a9,2025-05-10T00:54:58.380000
|
||||
CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000
|
||||
CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000
|
||||
CVE-2025-4043,0,1,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000
|
||||
CVE-2025-4043,0,0,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000
|
||||
CVE-2025-4047,0,0,697dde15b783c10558b99d9c3867d89fa2dd1910aca7332b9ebaf25195362a97,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000
|
||||
CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000
|
||||
@ -295036,7 +295041,7 @@ CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36
|
||||
CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000
|
||||
CVE-2025-4133,0,0,62707a46d404303184816916a5f626e6709dc33fc51eeac3cd7609c2da4dc930,2025-06-09T20:13:53.007000
|
||||
CVE-2025-4134,0,0,fe02b000815c2b18022230e610523ae527b21156d0dce332dccab36a3788f863,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4135,0,1,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000
|
||||
CVE-2025-4135,0,0,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000
|
||||
CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728a6,2025-05-02T13:53:40.163000
|
||||
CVE-2025-41360,0,0,0c58d2152e0e379d53112ddcbb05190aaed26ee5677fca051411e5049c547888,2025-06-06T14:06:58.193000
|
||||
CVE-2025-41361,0,0,bd83711ed5d2ea941a053d38aae602c59aadd1434b92514650a1e422cecff8e3,2025-06-06T14:06:58.193000
|
||||
@ -295053,7 +295058,7 @@ CVE-2025-4138,0,0,e24a1df01d5dbf416d0772fbc42743a05ce6be9e23d5dee2edf9f865e78913
|
||||
CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000
|
||||
CVE-2025-41385,0,0,37545ea39efd4d7b5e0d6cb5131cca3e61d7d577b10fafacb6827a6e97f74309,2025-06-04T19:58:38.140000
|
||||
CVE-2025-41388,0,0,cea4fd6e5baa020179de0c3ab4a93002a86c5b4be86c160109165aee67a76dd3,2025-06-18T13:47:10.020000
|
||||
CVE-2025-4139,0,1,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000
|
||||
CVE-2025-4139,0,0,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000
|
||||
CVE-2025-41393,0,0,530f65a313720270b05a5e04ea761ed2dfbc169adb957fa6f54beb0e36c6dbe7,2025-05-12T17:32:32.760000
|
||||
CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000
|
||||
CVE-2025-41399,0,0,7a1373417457a02ea13a0bd88541383fb57eb0536c4c4f5c68760eae861e0e0e,2025-05-08T14:39:09.683000
|
||||
@ -295462,7 +295467,7 @@ CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824
|
||||
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
|
||||
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
|
||||
CVE-2025-43946,0,0,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000
|
||||
CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43947,0,1,ae1d3f46580c150253bdd8592038a95b81141e936f71e9dab7b936d6192f4447,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
|
||||
CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000
|
||||
CVE-2025-43950,0,0,fd407a24e88ae012aca24316990e11ac16eda1715cfed08e301689999509229f,2025-04-23T14:15:29.930000
|
||||
@ -295658,8 +295663,8 @@ CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb
|
||||
CVE-2025-4499,0,0,1c02b1692a3925b37458edec07dd6f80534dbff3f2fbf04106606bb95639a5b2,2025-05-28T19:24:12.107000
|
||||
CVE-2025-44998,0,0,f1cb20085e6ad15afab179cb443903adcddb0c447c4e2857ef8052b5a5ee7d7a,2025-05-28T14:58:52.920000
|
||||
CVE-2025-4500,0,0,b252739c7e43e1ed91691824353b7e97e2316b3cdd7ea7ee228d50eda984af82,2025-05-16T14:16:47.373000
|
||||
CVE-2025-45001,0,1,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000
|
||||
CVE-2025-45002,0,1,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000
|
||||
CVE-2025-45001,0,0,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000
|
||||
CVE-2025-45002,0,0,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000
|
||||
CVE-2025-45007,0,0,5a942b67af458dcbffcc204143a4774311c59d5ad4885c5c55fb7d9c1ebbeebe,2025-05-09T13:45:28.627000
|
||||
CVE-2025-45009,0,0,36c5cbb0f37a55a2bcef11b942052fc47923af5c699055a488196b4ed54c3a22,2025-05-09T13:45:16.187000
|
||||
CVE-2025-4501,0,0,2714d56986429b577c90c5115348855d531ee85270c1ad90311b312266b13026,2025-05-28T19:25:52.347000
|
||||
@ -295775,6 +295780,7 @@ CVE-2025-45616,0,0,c9bb8d066376074c78acbc5924019c8e92d0a353068f59914673e5a7f7d2c
|
||||
CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985843,2025-05-06T04:16:18.073000
|
||||
CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000
|
||||
CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000
|
||||
CVE-2025-4563,1,1,02cd410129339d703842fe711979ad9145a12e58a5b9c9800dfb713f1cab80ce,2025-06-23T16:15:27.350000
|
||||
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000
|
||||
CVE-2025-45661,0,0,d4f42c25435e84688f4ce3b76e88805fd211efabda5b2495d0e5c2dcb924ab9f,2025-06-18T15:15:26.513000
|
||||
@ -295819,7 +295825,7 @@ CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b
|
||||
CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000
|
||||
CVE-2025-4585,0,0,de0ef46eb68a7bfcdbe12487f0dad42760c4b1425908d33a0156dee60d09c3e8,2025-06-16T12:32:18.840000
|
||||
CVE-2025-45854,0,0,8da6ea0519a831e65c7cd6df3945ca62dff794f0b2efeba768b2f0909531788a,2025-06-09T15:14:23.153000
|
||||
CVE-2025-45855,0,1,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000
|
||||
CVE-2025-45855,0,0,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000
|
||||
CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000
|
||||
CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000
|
||||
CVE-2025-45859,0,0,f04cb01d4c73926dbf1b974b33e3c12f183dcea4c8d1314caf69fec8d88d36b8,2025-06-16T18:25:52.807000
|
||||
@ -295869,9 +295875,9 @@ CVE-2025-46060,0,0,2da92ad7624a864b48c567a8180993e9f22aabb3ca09b58c16a9f521dba58
|
||||
CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000
|
||||
CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000
|
||||
CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000
|
||||
CVE-2025-46096,0,1,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
|
||||
CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
|
||||
CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000
|
||||
CVE-2025-46101,1,1,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000
|
||||
CVE-2025-46101,0,0,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000
|
||||
CVE-2025-46109,0,0,bb1109471e63f9f01bda5a8e1fe3323745e7e35c57fe91f6f8526660daab841f,2025-06-18T16:15:27.607000
|
||||
CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000
|
||||
CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000
|
||||
@ -296217,7 +296223,7 @@ CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094
|
||||
CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd509,2025-06-17T20:18:16.003000
|
||||
CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000
|
||||
CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000
|
||||
CVE-2025-46721,0,1,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000
|
||||
CVE-2025-46721,0,0,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000
|
||||
CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000
|
||||
CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000
|
||||
CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000
|
||||
@ -296596,7 +296602,7 @@ CVE-2025-47256,0,0,c5f61341ce1b30960f41faf1ef0c8059c16b1b83f0508df1bf27b84fa8e3d
|
||||
CVE-2025-4726,0,0,984a3badb3ae6972f992c3a68c560c7dfd9d5fe06debdb311c424144763624af,2025-05-27T19:51:34.753000
|
||||
CVE-2025-47268,0,0,4a46b9885e97102b8415ee3e4814f6839dc4a606dc76c0dedcf7a1f41c27c030,2025-06-13T18:21:42.427000
|
||||
CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43df35,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4727,0,1,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000
|
||||
CVE-2025-4727,0,0,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000
|
||||
CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000
|
||||
CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000
|
||||
CVE-2025-47272,0,0,1bb2a09d129fd4f2d7c6b93b95b1a828935f3db642060df71fcd1da62c721565,2025-06-02T17:32:17.397000
|
||||
@ -297034,7 +297040,7 @@ CVE-2025-4790,0,0,1cde53f18939fd245b2e017ab5d61b1aabe2517bc390d40b0830feb8eba632
|
||||
CVE-2025-47905,0,0,0badab8f2933a29538d7ef66ea7b6761136968565fc3d324c0e27cff6bcc6258,2025-05-29T09:15:26.587000
|
||||
CVE-2025-4791,0,0,28f506e7fa1c70a3ee261c046fff0149e1890f11d112b4d14f3ee7199740eeee,2025-05-23T13:19:04.810000
|
||||
CVE-2025-47916,0,0,7254b14db3d84a4fae2a957ff5aae1d18dda4aa5d6c7fa7b707e42e9728ce8d3,2025-06-20T17:42:15.083000
|
||||
CVE-2025-4792,0,1,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000
|
||||
CVE-2025-4792,0,0,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000
|
||||
CVE-2025-47928,0,0,c98d79f9403b054eccd93f148fcf481d13089a9bec154b271a0eadcf13b86566,2025-05-16T14:42:18.700000
|
||||
CVE-2025-47929,0,0,7fc15c7af26adf36cdf89018fb748ea0cea6a0ed56d6cabffa736dce44604a5c,2025-05-16T14:42:18.700000
|
||||
CVE-2025-4793,0,0,ec69064861ba117d418880947f64b864bae8e19e90fef5ea47c2be77c9ecb787,2025-05-21T21:00:12.357000
|
||||
@ -297364,9 +297370,9 @@ CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d
|
||||
CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48699,0,0,44d8862507c41a93f498ba4b6a9317982afecdc3e0eb3976f21c5759c7dadf21,2025-06-12T20:15:21.583000
|
||||
CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a8c,2025-05-21T19:40:16.293000
|
||||
CVE-2025-48700,1,1,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000
|
||||
CVE-2025-48700,0,0,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000
|
||||
CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000
|
||||
CVE-2025-48705,0,1,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000
|
||||
CVE-2025-48705,0,0,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000
|
||||
CVE-2025-48706,0,0,b6396ca4f8f26244025ac40c88dabb3a26eff089e363c92cb8bcd03b388139a9,2025-06-20T14:15:29.750000
|
||||
CVE-2025-48708,0,0,2f2ee7f6835a24101b8f2fad92720fa7e2d2cfee9343296271ef3f76df75e315,2025-06-20T17:13:54.913000
|
||||
CVE-2025-4871,0,0,d9183a6ea5a2afa28642be53d20b661c6aa8059e9e6e695046b3eafadb08ebe3,2025-06-12T16:27:46.547000
|
||||
@ -297386,7 +297392,7 @@ CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8
|
||||
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
|
||||
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
|
||||
CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000
|
||||
CVE-2025-48748,0,1,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000
|
||||
CVE-2025-48748,0,0,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000
|
||||
CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000
|
||||
CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000
|
||||
CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000
|
||||
@ -297558,7 +297564,7 @@ CVE-2025-49075,0,0,54be58c89d858cfc2a2a38282ca430d2d44e5da7afee9b9ba3a3af9890aab
|
||||
CVE-2025-49076,0,0,11ca67faa747268bd3e42ef94a795b585577483e7914ce9d6c222e8b9284807a,2025-06-06T14:06:58.193000
|
||||
CVE-2025-49077,0,0,ea2e636f032c4f39bdc78ff636e21026e853dcff77025a2be8dc5f87ad787347,2025-06-06T14:06:58.193000
|
||||
CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000
|
||||
CVE-2025-49080,0,1,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000
|
||||
CVE-2025-49080,0,0,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000
|
||||
CVE-2025-49081,0,0,f46741ebf083f87723e4189da0a46cfa0dc212582189b9cc78f69348a5e0933b,2025-06-17T20:32:38.453000
|
||||
CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000
|
||||
CVE-2025-49091,0,0,6801a10a59e1cc04be6899d10437a31277f24115003af5306a3ab76dcd2ff20b,2025-06-18T01:15:28.803000
|
||||
@ -297987,7 +297993,7 @@ CVE-2025-50048,0,0,51d0791e924069b35e627a01d5c6c3ad560a9ad85e74f0bb2bcf139e9159b
|
||||
CVE-2025-50049,0,0,726a0dd76d44294314cdc18ad7657fe08bc2f7ebe99df2fd6367d870bcf1cec6,2025-06-20T15:15:31.440000
|
||||
CVE-2025-50050,0,0,55ed1cfe9ba407ae0f1cef45284cfc220f443df1553027f06d9901c62736ec42,2025-06-20T15:15:31.590000
|
||||
CVE-2025-50051,0,0,586cfd8fc67c6e705f028bea1f285dc2f199480672abe9b2cbd65d3de69e7c1d,2025-06-20T15:15:31.747000
|
||||
CVE-2025-50054,0,0,56d928378c753c8a037c09aac14688a6511e72e126eb6212e7ffd9507c69711a,2025-06-20T07:15:26.367000
|
||||
CVE-2025-50054,0,1,8345803c26053cd2e12f78da8fd6f235094a62d9934b629ba0efa2d7c6076176,2025-06-20T07:15:26.367000
|
||||
CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
|
||||
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
|
||||
CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
|
||||
@ -298024,10 +298030,10 @@ CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced
|
||||
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
|
||||
CVE-2025-5034,0,0,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000
|
||||
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
|
||||
CVE-2025-5049,0,1,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
|
||||
CVE-2025-5050,0,1,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
|
||||
CVE-2025-5051,0,1,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000
|
||||
CVE-2025-5052,0,1,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000
|
||||
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
|
||||
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
|
||||
CVE-2025-5051,0,0,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000
|
||||
CVE-2025-5052,0,0,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000
|
||||
CVE-2025-5053,0,0,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000
|
||||
CVE-2025-5054,0,0,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000
|
||||
@ -298045,8 +298051,8 @@ CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee
|
||||
CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
|
||||
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
|
||||
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
|
||||
CVE-2025-5075,0,1,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000
|
||||
CVE-2025-5076,0,1,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000
|
||||
CVE-2025-5075,0,0,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000
|
||||
CVE-2025-5076,0,0,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000
|
||||
CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
|
||||
CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
|
||||
CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
|
||||
@ -298065,8 +298071,8 @@ CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68
|
||||
CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000
|
||||
CVE-2025-5108,0,0,78dbeee09f012ae2aaa551a95acb36d04547bdfe4234231d8b8da6c18969eef6,2025-05-27T15:15:35.727000
|
||||
CVE-2025-5109,0,0,af8f6823c329a88d09917c36f339b1374b9b939e3d9208c4a4573c3155524a8d,2025-06-20T16:02:35.837000
|
||||
CVE-2025-5110,0,1,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000
|
||||
CVE-2025-5111,0,1,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000
|
||||
CVE-2025-5110,0,0,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000
|
||||
CVE-2025-5111,0,0,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000
|
||||
CVE-2025-5112,0,0,14e5700c63f1f1d448cfb10a35f8ed4225ebfe296cafec9014826190b78b6763,2025-05-23T15:54:42.643000
|
||||
CVE-2025-5113,0,0,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a9933,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000
|
||||
@ -298212,7 +298218,7 @@ CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b
|
||||
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
|
||||
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
|
||||
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
|
||||
CVE-2025-52542,1,1,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000
|
||||
CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000
|
||||
CVE-2025-5255,0,0,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000
|
||||
CVE-2025-52552,0,0,27741305ae00f3d36bb92eb33f15f4f7f40418a880f409aa430ffa00fa775060,2025-06-21T03:15:24.990000
|
||||
CVE-2025-52556,0,0,839776e8ea5d48efbfe10dd749a9ae7819c361ef6cbb9befd317045b49103746,2025-06-21T02:15:19.947000
|
||||
@ -298268,11 +298274,11 @@ CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3
|
||||
CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000
|
||||
CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52875,1,1,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000
|
||||
CVE-2025-52876,1,1,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000
|
||||
CVE-2025-52877,1,1,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000
|
||||
CVE-2025-52878,1,1,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000
|
||||
CVE-2025-52879,1,1,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000
|
||||
CVE-2025-52875,0,0,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000
|
||||
CVE-2025-52876,0,0,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000
|
||||
CVE-2025-52877,0,0,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000
|
||||
CVE-2025-52878,0,0,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000
|
||||
CVE-2025-52879,0,0,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000
|
||||
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5289,0,0,b9d742cd07348cf5ac5a6bc32677ea7f81a3f79e8dc609eede8959a563a09a42,2025-06-21T11:15:35.240000
|
||||
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
|
||||
@ -298289,12 +298295,13 @@ CVE-2025-52923,0,0,825efd0bf97043c553869930f73d387d618324b6c5d516039439c06bdeeb2
|
||||
CVE-2025-52926,0,0,a2ea71f5f513826223184ebdf984a9517b3b97a40b47a0432cc67e7fcc0b13bd,2025-06-23T01:15:21.877000
|
||||
CVE-2025-52935,0,0,69f0a3d1fc334d25c1072a4fb7417df75df937e1592f0e78c34731ed1c3d5dec,2025-06-23T10:15:27.380000
|
||||
CVE-2025-52936,0,0,5a73b32cd0cf146bc0ee081a574067937ffe0c6a2ffedc2de43fa39d77cb9bb9,2025-06-23T10:15:27.570000
|
||||
CVE-2025-52937,0,1,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000
|
||||
CVE-2025-52937,0,0,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000
|
||||
CVE-2025-52938,0,0,32cfa0125cbed90894c155e967587051de3d80629a5cbc836d8fa783497c0b5c,2025-06-23T10:15:27.857000
|
||||
CVE-2025-52939,0,0,acb57ccf8c49d776c9ae1d73e624db6ecf3f28e9fcac64a91b7b96853d88ef7b,2025-06-23T10:15:28.007000
|
||||
CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000
|
||||
CVE-2025-52967,1,1,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000
|
||||
CVE-2025-52968,1,1,a9658590dac69c266160ede971810619ebd88051cc14c521e59449b331bfcf05,2025-06-23T15:15:29.350000
|
||||
CVE-2025-52967,0,0,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000
|
||||
CVE-2025-52968,0,1,1b929f37b5e64d12a621147b3a595070ab199f341f8983fdb5e0a7be6e7d4b90,2025-06-23T17:15:30.990000
|
||||
CVE-2025-52969,1,1,546a1519926ec728f2b164af7db7b3a0ef54cc320ae9101eb035308842ea95cb,2025-06-23T17:15:31.137000
|
||||
CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
|
||||
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
|
||||
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
|
||||
@ -298310,8 +298317,8 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a
|
||||
CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000
|
||||
CVE-2025-5327,0,0,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000
|
||||
CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000
|
||||
CVE-2025-5330,0,1,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000
|
||||
CVE-2025-5331,0,1,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000
|
||||
CVE-2025-5330,0,0,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000
|
||||
CVE-2025-5331,0,0,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000
|
||||
CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000
|
||||
CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000
|
||||
CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000
|
||||
@ -298541,13 +298548,13 @@ CVE-2025-5637,0,0,b4095ae9d6d117e5e5fe317c037877142ad009ffe86dcd38c16540d27f7b17
|
||||
CVE-2025-5638,0,0,5fa603e90eeb98583ea40591c0f1493256693a05d984ab5725744a9282518d9e,2025-06-06T20:12:17.237000
|
||||
CVE-2025-5639,0,0,df69c796d2f2dcdd7b52222b3cca34eb33581a84dfcf4149ec44f708e4f12118,2025-06-06T20:12:28.340000
|
||||
CVE-2025-5640,0,0,a28c86c8136e1feb945fccbeca2e1e5a219c046c15a8a6365d3963b3188e3fa7,2025-06-05T20:12:23.777000
|
||||
CVE-2025-5641,0,1,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000
|
||||
CVE-2025-5642,0,1,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000
|
||||
CVE-2025-5643,0,1,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000
|
||||
CVE-2025-5644,0,1,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000
|
||||
CVE-2025-5645,0,1,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000
|
||||
CVE-2025-5646,0,1,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000
|
||||
CVE-2025-5647,0,1,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000
|
||||
CVE-2025-5641,0,0,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000
|
||||
CVE-2025-5642,0,0,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000
|
||||
CVE-2025-5643,0,0,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000
|
||||
CVE-2025-5644,0,0,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000
|
||||
CVE-2025-5645,0,0,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000
|
||||
CVE-2025-5646,0,0,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000
|
||||
CVE-2025-5647,0,0,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000
|
||||
CVE-2025-5648,0,0,8d8a946a9691d84bd632207adec092a07f5e621bdddce363a223111a1e12ac35,2025-06-17T18:56:04.373000
|
||||
CVE-2025-5649,0,0,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000
|
||||
CVE-2025-5650,0,0,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000
|
||||
@ -298710,7 +298717,7 @@ CVE-2025-5871,0,0,cf8b155d3f5676937055fc70fc356be425d106281694dba873cdc0b7b3134e
|
||||
CVE-2025-5872,0,0,df91dff262321d8e54a907aa2d26c35e2664d50439e57f3d1baa4408ee42b93e,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e7f,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5875,0,1,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
|
||||
CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
|
||||
CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000
|
||||
CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000
|
||||
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
|
||||
@ -298797,7 +298804,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399
|
||||
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
|
||||
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
|
||||
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6019,0,1,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000
|
||||
CVE-2025-6019,0,0,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000
|
||||
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
|
||||
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
|
||||
@ -298992,54 +298999,54 @@ CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b
|
||||
CVE-2025-6347,0,0,76734206bdc523737368eb0b5491079d98ed161c921feac5e394265e2bbfb26b,2025-06-20T16:15:30.057000
|
||||
CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
|
||||
CVE-2025-6352,0,0,62dcc2d0d677be1f0bf6457d6b220cb963fe1d46556db17bc4c47d1d8c8d8385,2025-06-20T16:15:30.430000
|
||||
CVE-2025-6353,0,0,59d8b8297840f89c40ef36cdd69b9e5d760b77a0f415fde65797366096e36de0,2025-06-20T17:15:41.737000
|
||||
CVE-2025-6354,0,0,e5ff5359021ef92c7c075fbef4ee6410047d4c341520f408b4431aef1608a6a6,2025-06-20T17:15:41.977000
|
||||
CVE-2025-6355,0,0,9e75b08ef9e6d0811eec887a3b5a5f4bd2fd3b5be1479bcfaeb0db5aa9d2e49b,2025-06-20T17:15:42.217000
|
||||
CVE-2025-6356,0,0,8906897f1b5089a2863720fd249aa4f385343dd922b3be13810cd907806bfc51,2025-06-20T18:15:29.280000
|
||||
CVE-2025-6353,0,1,bcedf07597810e9d313a4c3a7c18928e1fe4e3b892c9aeb0160c86103a73a43f,2025-06-23T16:15:28.043000
|
||||
CVE-2025-6354,0,1,df2134d7cd28fa0b4ed4b2c0d2a5b7ad474049f7ae16993180dd54340ff08c00,2025-06-23T16:15:28.183000
|
||||
CVE-2025-6355,0,1,ed61aa51361a6ef5314447f6138259759f329568a14df6f763349dcac107378e,2025-06-23T16:15:28.320000
|
||||
CVE-2025-6356,0,1,6f51e45f250dd5d789a43513a01d7864e0501c685d80308e7b466dd47b28658b,2025-06-23T16:15:28.447000
|
||||
CVE-2025-6357,0,0,9994f05f11f6fd4f3843657895c3ed7e60bf0cef59fb9fbb76dab8a2b1e4789f,2025-06-20T18:15:29.477000
|
||||
CVE-2025-6358,0,0,f99bf02cecc343314055e7b36fb7d8f9037e216a78f33ee40b5413a6190a3216,2025-06-20T18:15:29.660000
|
||||
CVE-2025-6359,0,0,9d007b920753fa0df20b7c612cf2630a29866fc99794bb75396ed51646f5b228,2025-06-20T19:15:37.803000
|
||||
CVE-2025-6358,0,1,90168a7e5f8bb04f80098d96bc607af18cccd3b433e581f356f31a7c50836f9f,2025-06-23T16:15:28.577000
|
||||
CVE-2025-6359,0,1,971dd2636f9a6ba83e95d9b37af5b017dc1aff2e022f864346c14d22f1642f48,2025-06-23T16:15:28.707000
|
||||
CVE-2025-6360,0,0,29092be81e3b76da8c7336c69490f45ea3fdc5ab81dd51a38ebd8491d2510cb3,2025-06-20T19:15:38.023000
|
||||
CVE-2025-6361,0,0,497d8faf69695876782410eef11eb7c547567394663443e19fb6830ea9f5d580,2025-06-20T20:15:34.633000
|
||||
CVE-2025-6362,0,0,200f7dcdd01d32c3f0ee5808f9417c4d37452dd91b91b230b5879aeb762b55dc,2025-06-20T20:15:34.820000
|
||||
CVE-2025-6363,0,0,02ac2f155cec55cb8bc0cf8655350fdcf92c00dcede0bce48e58b81564cda535,2025-06-20T20:15:35.003000
|
||||
CVE-2025-6364,0,0,006bf7fbb97f6b87a275c265150de651dc85857c35924c5c61f64c74246732f3,2025-06-20T21:15:22.957000
|
||||
CVE-2025-6365,0,0,e7e0ed9d0d08d064f4be3e304abee4c9926e1d8a86b07b52cae6a84b3ece8e29,2025-06-20T21:15:23.140000
|
||||
CVE-2025-6367,0,0,d73c83ef68be9737bb36adece1ed10045d8ea359beea0979c29b6d1ef155c944,2025-06-20T21:15:23.327000
|
||||
CVE-2025-6368,0,1,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000
|
||||
CVE-2025-6369,0,1,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000
|
||||
CVE-2025-6370,0,1,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000
|
||||
CVE-2025-6371,0,1,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000
|
||||
CVE-2025-6372,0,0,11f261fd4f301b97a69b5991b974c6cc6925c34359044898a0d8cdb4b3c65be3,2025-06-20T23:15:20.077000
|
||||
CVE-2025-6363,0,1,ab8b6a80460bac6a8b4812f18ab1e9501d5cb1f0c950496fa3871733e7d502dc,2025-06-23T16:15:28.830000
|
||||
CVE-2025-6364,0,1,a7952d8f2b6f3d7a697638c673b9b44940e0e41de7c45bcb912151791a9d8bc1,2025-06-23T16:15:28.960000
|
||||
CVE-2025-6365,0,1,fc8714e58327815c646e42087290ed224d315b6d66cea9788d79d9a5202a610f,2025-06-23T16:15:29.093000
|
||||
CVE-2025-6367,0,1,44fe957d1b3839d7e219e2790bd5d0ed99b3dd2b72cc35955a21c23e4d4c6e1a,2025-06-23T16:15:29.233000
|
||||
CVE-2025-6368,0,0,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000
|
||||
CVE-2025-6369,0,0,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000
|
||||
CVE-2025-6370,0,0,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000
|
||||
CVE-2025-6371,0,0,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000
|
||||
CVE-2025-6372,0,1,36c00124f4b93e190073a36ed7b0a2b2147469323e9aef7f9b8c2b21f1929ac6,2025-06-23T16:15:29.363000
|
||||
CVE-2025-6373,0,0,6e218b88406a89e42e51ab0b6bce2f99cf7c4031ea9443c81ddd02dc9c9521cd,2025-06-21T00:15:22.420000
|
||||
CVE-2025-6374,0,0,b64de8ac08765ef2aa29524f49bd34819f262290b45c21bdea86cc8246ba3a99,2025-06-21T01:15:29.257000
|
||||
CVE-2025-6375,0,1,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000
|
||||
CVE-2025-6375,0,0,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000
|
||||
CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d1191f,2025-06-19T21:15:27.390000
|
||||
CVE-2025-6393,0,1,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000
|
||||
CVE-2025-6394,0,1,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000
|
||||
CVE-2025-6393,0,0,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000
|
||||
CVE-2025-6394,0,0,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000
|
||||
CVE-2025-6399,0,0,4e1efe71bd5e4cfa8ab2ff5a9127ce00373b7f6790fd011901c9b5eee0f73f6a,2025-06-21T04:15:23.140000
|
||||
CVE-2025-6400,0,0,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000
|
||||
CVE-2025-6401,0,0,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000
|
||||
CVE-2025-6402,0,0,86e3fb80660b4a0aa440d06524000ca21ff60f631715b366a9d8547e04bbf0c9,2025-06-21T09:15:22.193000
|
||||
CVE-2025-6403,0,1,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000
|
||||
CVE-2025-6404,0,1,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000
|
||||
CVE-2025-6405,0,1,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000
|
||||
CVE-2025-6406,0,1,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000
|
||||
CVE-2025-6407,0,1,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000
|
||||
CVE-2025-6408,0,1,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000
|
||||
CVE-2025-6403,0,0,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000
|
||||
CVE-2025-6404,0,0,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000
|
||||
CVE-2025-6405,0,0,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000
|
||||
CVE-2025-6406,0,0,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000
|
||||
CVE-2025-6407,0,0,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000
|
||||
CVE-2025-6408,0,0,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000
|
||||
CVE-2025-6409,0,0,ab58691f2ecf6e947a9564c4c0156aa3bbf03a9b1aeb4b1e15a35636ca599aaf,2025-06-21T16:15:21.407000
|
||||
CVE-2025-6410,0,0,c0173d12925efeb271e682924d6b75fbb1583ecd595d8bae5f480e46133161cc,2025-06-21T17:15:23.580000
|
||||
CVE-2025-6411,0,0,b8157503290e836e4debd48f60c1e95d700074b4878a50f7f6bd70907c82b061,2025-06-21T17:15:23.800000
|
||||
CVE-2025-6412,0,0,6bba585df4a6a1290d4defcad0a067fb3000d58fdf83ecbd8be32ef6de55500b,2025-06-21T18:15:23.830000
|
||||
CVE-2025-6413,0,1,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000
|
||||
CVE-2025-6414,0,1,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000
|
||||
CVE-2025-6415,0,1,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000
|
||||
CVE-2025-6416,0,1,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000
|
||||
CVE-2025-6417,0,1,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000
|
||||
CVE-2025-6418,0,1,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000
|
||||
CVE-2025-6419,0,1,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000
|
||||
CVE-2025-6420,0,1,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000
|
||||
CVE-2025-6421,0,1,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000
|
||||
CVE-2025-6413,0,0,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000
|
||||
CVE-2025-6414,0,0,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000
|
||||
CVE-2025-6415,0,0,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000
|
||||
CVE-2025-6416,0,0,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000
|
||||
CVE-2025-6417,0,0,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000
|
||||
CVE-2025-6418,0,0,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000
|
||||
CVE-2025-6419,0,0,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000
|
||||
CVE-2025-6420,0,0,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000
|
||||
CVE-2025-6421,0,0,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000
|
||||
CVE-2025-6422,0,0,c573c4db3c0f20957365ddf4fca4d8cd722bee1aea05672517904a42b456062e,2025-06-21T23:15:24.563000
|
||||
CVE-2025-6446,0,0,44bb6e746b3927f98410a922df7f49f7dfc756465d7a1b8c41e32b3d72a60ca9,2025-06-21T23:15:24.743000
|
||||
CVE-2025-6447,0,0,d6e53d5485fb5a3d0f12bc8d5c88d5554f6d7639b5607c74f1cea40c03552c01,2025-06-22T00:15:25.220000
|
||||
@ -299047,14 +299054,14 @@ CVE-2025-6448,0,0,40cda260ec27fd5e0737735c0c34194b09100006124949d443f7335c8e347f
|
||||
CVE-2025-6449,0,0,116d3d2e21456f110f9a0f23b1e214947937874eabee1f30050b1cc53b689b69,2025-06-22T01:15:24.283000
|
||||
CVE-2025-6450,0,0,7799bb9dd2f2f68c9e0b3e0363e03394a18b58a0cbe8e725f2b08981ea76741f,2025-06-22T01:15:24.470000
|
||||
CVE-2025-6451,0,0,ddfd5352b74ff29f320f2da5b49b9c3961bbabfa82ef06d1c3b29e20d8991728,2025-06-22T02:15:22.983000
|
||||
CVE-2025-6452,0,1,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000
|
||||
CVE-2025-6453,0,1,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000
|
||||
CVE-2025-6455,0,1,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000
|
||||
CVE-2025-6456,0,1,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000
|
||||
CVE-2025-6457,0,1,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000
|
||||
CVE-2025-6458,0,1,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000
|
||||
CVE-2025-6466,0,1,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000
|
||||
CVE-2025-6467,0,1,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000
|
||||
CVE-2025-6452,0,0,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000
|
||||
CVE-2025-6453,0,0,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000
|
||||
CVE-2025-6455,0,0,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000
|
||||
CVE-2025-6456,0,0,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000
|
||||
CVE-2025-6457,0,0,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000
|
||||
CVE-2025-6458,0,0,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000
|
||||
CVE-2025-6466,0,0,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000
|
||||
CVE-2025-6467,0,0,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000
|
||||
CVE-2025-6468,0,0,fbd044ac936e33262d45471d5bd03b56e48368b2b44c1a71ed9578ebf513d15a,2025-06-22T08:15:24.677000
|
||||
CVE-2025-6469,0,0,9aabfd74ea6320805ce8b656f216d435faba1feb3077facc77facf7f64092150,2025-06-22T08:15:25.497000
|
||||
CVE-2025-6470,0,0,5f23ea5ce0815ab35440026fa17de2e18509ec334d3f2e6b8233a9348a155287,2025-06-22T09:15:25.157000
|
||||
@ -299064,7 +299071,7 @@ CVE-2025-6473,0,0,09409a4bd477f81614d70281f18b72d4f6fa78f49d1117127779c435ad3600
|
||||
CVE-2025-6474,0,0,3e39c8512816416fe8c7ddf5aaed888f37c2634d5d80b0be4ec720b4c35ad5bc,2025-06-22T12:15:19.777000
|
||||
CVE-2025-6475,0,0,0344ea1c6e041c7440b343720387b9179b9f0e1cabde7f3aafb90f7057fbc66d,2025-06-22T12:15:20.747000
|
||||
CVE-2025-6476,0,0,d7334e2904c03dcecdcfc40845defacdd1ecf8afbe242a8181c73133e9d019d9,2025-06-22T13:15:34.470000
|
||||
CVE-2025-6477,0,1,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000
|
||||
CVE-2025-6477,0,0,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000
|
||||
CVE-2025-6478,0,0,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000
|
||||
CVE-2025-6479,0,0,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000
|
||||
CVE-2025-6480,0,0,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000
|
||||
@ -299082,11 +299089,15 @@ CVE-2025-6493,0,0,b07984a53cd9acdb838d53ec36f19bf2b78d39f60ec9fbcd3799653f00698e
|
||||
CVE-2025-6494,0,0,86f1220d913db6a1ab74494e021685dc10d3e076bd7d139d8673bfd67dc71200,2025-06-22T23:15:20.103000
|
||||
CVE-2025-6496,0,0,2b5f2de3f64d739030644e9cc059b885cfe6a37938dff98fe008e38153a2053e,2025-06-23T00:15:23.117000
|
||||
CVE-2025-6497,0,0,dc164f05cd4fbed7722e13df6028fdc1267acb81bac64b9f55e604144a684c22,2025-06-23T01:15:22.073000
|
||||
CVE-2025-6498,0,1,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000
|
||||
CVE-2025-6499,0,1,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000
|
||||
CVE-2025-6500,0,1,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000
|
||||
CVE-2025-6501,0,1,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000
|
||||
CVE-2025-6498,0,0,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000
|
||||
CVE-2025-6499,0,0,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000
|
||||
CVE-2025-6500,0,0,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000
|
||||
CVE-2025-6501,0,0,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000
|
||||
CVE-2025-6502,0,0,dee39bba679fa1664ff5ffd6d1f5297b6166726b2901546250d37a4402661b97,2025-06-23T04:15:24.780000
|
||||
CVE-2025-6503,0,0,09279d17f7c61f97e4798e7b6e3c3fe45d55c669f7d25ad1125f5eab7e1ec9d8,2025-06-23T04:15:42.737000
|
||||
CVE-2025-6509,1,1,2aac3f390efb001eb5e772abfe22fa572851732ca789fb54373fe951baac1f4b,2025-06-23T16:15:29.560000
|
||||
CVE-2025-6510,1,1,e99e364cac546b151f8c26db6330a22c841229fd024490545442019c2170bf2d,2025-06-23T16:15:29.770000
|
||||
CVE-2025-6511,1,1,4689ea3fded3deafcf094dc9c193908921ce796acb819025e59f821328837b70,2025-06-23T17:15:32.347000
|
||||
CVE-2025-6512,0,0,929074c40784a8a7e4bea63b3e8fde745aecb9b4aac7e380dbea6fff6bf1a027,2025-06-23T13:15:22.460000
|
||||
CVE-2025-6513,0,0,fce112496af3766c83513d2f7532743c646a19af3da3761627887efca2174e9f,2025-06-23T13:15:23.040000
|
||||
CVE-2025-6516,1,1,e1b221c85d85f1613a82baa969aaa96dac7131ffc9bbbcdaf0ed77517e236f49,2025-06-23T17:15:32.550000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user