Auto-Update: 2025-06-23T18:00:26.982876+00:00

This commit is contained in:
cad-safe-bot 2025-06-23 18:04:04 +00:00
parent 1e14d1b12f
commit 03b3cd9ee1
40 changed files with 1211 additions and 250 deletions

View File

@ -0,0 +1,29 @@
{
"id": "CVE-2023-47031",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T17:15:27.313",
"lastModified": "2025-06-23T17:15:27.313",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to escalate privileges via a crafted POST request to the grantRolesToUsers, grantRolesToGroups, and grantRolesToOrganization SOAP API component."
}
],
"metrics": {},
"references": [
{
"url": "http://ncr.com",
"source": "cve@mitre.org"
},
{
"url": "http://terminal.com",
"source": "cve@mitre.org"
},
{
"url": "https://drive.google.com/file/d/1f9riw_seicV9MB7pRQJFY-8voxkW8ZYH/view?usp=sharing",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47032",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:23.920",
"lastModified": "2025-06-23T16:15:23.920",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Password Vulnerability in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code via a crafted script to the UserService SOAP API function."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1rTKc2nxEc40VTItJiJ9moZ5VrHG3xQuj/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47032/CVE-2023-47032.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47294",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.493",
"lastModified": "2025-06-23T16:15:24.493",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47294/CVE-2023-47294.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2023-47295",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.623",
"lastModified": "2025-06-23T16:15:24.623",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A CSV injection vulnerability in NCR Terminal Handler v1.5.1 allows attackers to execute arbitrary commands via injecting a crafted payload into any text field that accepts strings."
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/14uldfUpLRIc-NfHiUco0ja-ZiF0MazGA/view?usp=sharing",
"source": "cve@mitre.org"
},
{
"url": "https://github.com/pwahba/cve-research/blob/main/CVE-2023-47295/CVE-2023-47295.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2023-50450",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.743",
"lastModified": "2025-06-23T16:15:24.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges."
}
],
"metrics": {},
"references": [
{
"url": "https://code-white.com/public-vulnerability-list/",
"source": "cve@mitre.org"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform which makes use of Cisco NCS application service. Active and Standby Directors communicate over TCP ports 4566 and 4570 to exchange High Availability (HA) information using a shared password. Affected versions of Versa Director bound to these ports on all interfaces. An attacker that can access the Versa Director could access the NCS service on port 4566 and exploit it to perform unauthorized administrative actions and perform remote code execution. Customers are recommended to follow the hardening guide.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director utiliza el servicio de aplicaciones Cisco NCS. Los directores activos y en espera se comunican a trav\u00e9s de los puertos TCP 4566 y 4570 para intercambiar informaci\u00f3n de alta disponibilidad (HA) mediante una contrase\u00f1a compartida. Las versiones afectadas de Versa Director est\u00e1n vinculadas a estos puertos en todas las interfaces. Un atacante que acceda a Versa Director podr\u00eda acceder al servicio NCS en el puerto 4566 y explotarlo para realizar acciones administrativas no autorizadas y ejecutar c\u00f3digo remoto. Se recomienda a los clientes seguir la gu\u00eda de refuerzo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad."
}
],
"metrics": {

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-21550",
"sourceIdentifier": "secalert_us@oracle.com",
"published": "2025-01-21T21:15:21.510",
"lastModified": "2025-06-23T15:25:05.683",
"vulnStatus": "Analyzed",
"lastModified": "2025-03-13T15:15:51.980",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{
@ -51,40 +51,10 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3BBB9F8E-7374-4426-A269-FB669644538F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C28D8453-2E02-43C3-8998-8B694F4B7505"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oracle:financial_services_behavior_detection_platform:8.1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "49BE74EB-7D30-47FF-B1BD-21A57CD091B1"
}
]
}
]
}
],
"references": [
{
"url": "https://www.oracle.com/security-alerts/cpujan2025.html",
"source": "secalert_us@oracle.com",
"tags": [
"Vendor Advisory"
]
"source": "secalert_us@oracle.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability allowing remote code execution (RCE) on the Backup Server by an authenticated domain user"
},
{
"lang": "es",
"value": "Una vulnerabilidad que permite la ejecuci\u00f3n remota de c\u00f3digo (RCE) en el servidor de respaldo por parte de un usuario de dominio autenticado"
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform implements Two-Factor Authentication (2FA) using One-Time Passcodes (OTP) delivered via email or SMS. Versa Director accepts untrusted user input when dispatching 2FA codes, allowing an attacker who knows a valid username and password to redirect the OTP delivery (SMS/email) to their own device. OTP/TOTP codes are not invalidated after use, enabling reuse by an attacker who has previously intercepted or obtained a valid code. In addition, the 2FA system does not adequately restrict the number or frequency of login attempts. The OTP values are generated from a relatively small keyspace, making brute-force attacks more feasible. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n SD-WAN Versa Director implementa la autenticaci\u00f3n de dos factores (2FA) mediante c\u00f3digos de acceso de un solo uso (OTP) enviados por correo electr\u00f3nico o SMS. Versa Director acepta la entrada de usuarios no confiables al enviar c\u00f3digos 2FA, lo que permite a un atacante que conoce un nombre de usuario y una contrase\u00f1a v\u00e1lidos redirigir el env\u00edo de OTP (SMS/correo electr\u00f3nico) a su propio dispositivo. Los c\u00f3digos OTP/TOTP no se invalidan despu\u00e9s de su uso, lo que permite su reutilizaci\u00f3n por un atacante que haya interceptado u obtenido previamente un c\u00f3digo v\u00e1lido. Adem\u00e1s, el sistema 2FA no restringe adecuadamente el n\u00famero ni la frecuencia de los intentos de inicio de sesi\u00f3n. Los valores OTP se generan a partir de un espacio de claves relativamente peque\u00f1o, lo que facilita los ataques de fuerza bruta. Estado de explotaci\u00f3n: Versa Networks no tiene conocimiento de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform allows customization of the user interface, including the header, footer, and logo. However, the input provided for these customizations is not properly validated or sanitized, allowing a malicious user to inject and store cross-site scripting (XSS) payloads. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite personalizar la interfaz de usuario, incluyendo el encabezado, el pie de p\u00e1gina y el logotipo. Sin embargo, la informaci\u00f3n proporcionada para estas personalizaciones no se valida ni se depura adecuadamente, lo que permite que un usuario malintencionado inyecte y almacene cargas \u00fatiles de Cross-site Scripting (XSS). Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para desactivar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform includes functionality to initiate SSH sessions to remote CPEs and the Director shell via Shell-In-A-Box. The underlying Python script, shell-connect.py, is vulnerable to command injection through the user argument. This allows an attacker to execute arbitrary commands on the system. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye la funcionalidad para iniciar sesiones SSH con CPE remotos y el shell de Director mediante Shell-In-A-Box. El script de Python subyacente, shell-connect.py, es vulnerable a la inyecci\u00f3n de comandos mediante el argumento de usuario. Esto permite a un atacante ejecutar comandos arbitrarios en el sistema. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides an option to upload various types of files. The Versa Director does not correctly limit file upload permissions. The UI appears not to allow file uploads but uploads still succeed. In addition, the Versa Director discloses the full filename of uploaded temporary files, including the UUID prefix. Insecure UCPE image upload in Versa Director allows an authenticated attacker to upload a webshell. \r\n\r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN ofrece la opci\u00f3n de cargar varios tipos de archivos. Versa Director no limita correctamente los permisos de carga de archivos. La interfaz de usuario parece no permitir la carga de archivos, pero aun as\u00ed se carga correctamente. Adem\u00e1s, Versa Director revela el nombre completo de los archivos temporales cargados, incluido el prefijo UUID. La carga insegura de im\u00e1genes UCPE en Versa Director permite que un atacante autenticado cargue un webshell. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario. Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform includes a Webhook feature for sending notifications to external HTTP endpoints. However, the \"Add Webhook\" and \"Test Webhook\" functionalities can be abused by an authenticated user to send crafted HTTP requests to localhost. This can be leveraged to execute commands on behalf of the versa user, who has sudo privileges, potentially leading to privilege escalation or remote code execution. \r\n \r\nExploitation Status: \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN incluye una funci\u00f3n de webhook para enviar notificaciones a endpoints HTTP externos. Sin embargo, un usuario autenticado puede abusar de las funciones \"A\u00f1adir webhook\" y \"Probar webhook\" para enviar solicitudes HTTP manipuladas al host local. Esto puede aprovecharse para ejecutar comandos en nombre del usuario de Versa, que tiene privilegios de sudo, lo que podr\u00eda provocar una escalada de privilegios o la ejecuci\u00f3n remota de c\u00f3digo. Estado de explotaci\u00f3n: Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto para esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: No existen soluciones alternativas para deshabilitar la opci\u00f3n de la interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides direct web-based access to uCPE virtual machines through the Director GUI. By default, the websockify service is exposed on port 6080 and accessible from the internet. This exposure introduces significant risk, as websockify has known weaknesses that can be exploited, potentially leading to remote code execution. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nRestrict access to TCP port 6080 if uCPE console access is not necessary. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN proporciona acceso web directo a las m\u00e1quinas virtuales uCPE a trav\u00e9s de la interfaz gr\u00e1fica de Director. De forma predeterminada, el servicio websockify est\u00e1 expuesto en el puerto 6080 y es accesible desde internet. Esta exposici\u00f3n supone un riesgo significativo, ya que websockify presenta vulnerabilidades conocidas que pueden explotarse, lo que podr\u00eda provocar la ejecuci\u00f3n remota de c\u00f3digo. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han publicado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Restrinja el acceso al puerto TCP 6080 si no necesita acceder a la consola uCPE. Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability allowing an authenticated user with the Backup Operator role to modify backup jobs, which could execute arbitrary code."
},
{
"lang": "es",
"value": "Una vulnerabilidad que permite a un usuario autenticado con el rol de Operador de respaldo modificar trabajos de respaldo, lo que podr\u00eda ejecutar c\u00f3digo arbitrario."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability allowing local system users to modify directory contents, allowing for arbitrary code execution on the local system with elevated permissions."
},
{
"lang": "es",
"value": "Una vulnerabilidad que permite a los usuarios del sistema local modificar el contenido del directorio, lo que permite la ejecuci\u00f3n de c\u00f3digo arbitrario en el sistema local con permisos elevados."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director software exposes a number of services by default and allow attackers an easy foothold due to default credentials and multiple accounts (most with sudo access) that utilize the same default credentials. By default, Versa director exposes ssh and postgres to the internet, alongside a host of other services.\r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nWorkarounds or Mitigation: \r\n\r\nVersa recommends the following security controls:\r\n\r\n1) Change default passwords to complex passwords\r\n2) Passwords must be complex with at least 8 characters that comprise of upper case, and lower case alphabets, as well as at at least one digit, and one special character\r\n3) Passwords must be changed at least every 90 days\r\n4) Password change history is checked to ensure that the at least the last 5 passwords must be used when changing password.\r\n5) Review and audit logs for all authentication attempts to check for unauthorized/suspicious login attempts and enforce remediation steps."
},
{
"lang": "es",
"value": "El software Versa Director expone varios servicios por defecto y facilita el acceso a los atacantes gracias a las credenciales predeterminadas y a varias cuentas (la mayor\u00eda con acceso sudo) que utilizan las mismas credenciales predeterminadas. Por defecto, Versa Director expone SSH y Postgres a internet, junto con otros servicios. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. Soluciones alternativas o mitigaci\u00f3n: Versa recomienda los siguientes controles de seguridad: 1) Cambiar las contrase\u00f1as predeterminadas por contrase\u00f1as complejas. 2) Las contrase\u00f1as deben ser complejas, con al menos 8 caracteres (may\u00fasculas y min\u00fasculas), adem\u00e1s de al menos un d\u00edgito y un car\u00e1cter especial. 3) Las contrase\u00f1as deben cambiarse al menos cada 90 d\u00edas. 4) Se revisa el historial de cambios de contrase\u00f1a para garantizar que se utilicen al menos las \u00faltimas 5 contrase\u00f1as al cambiarlas. 5) Revisar y auditar los registros de todos los intentos de autenticaci\u00f3n para detectar intentos de inicio de sesi\u00f3n no autorizados o sospechosos y aplicar medidas correctivas."
}
],
"metrics": {

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "The Versa Director SD-WAN orchestration platform provides functionality to upload various types of files. However, the Java code handling file uploads contains an argument injection vulnerability. By appending additional arguments to the file name, an attacker can bypass MIME type validation, allowing the upload of arbitrary file types. This flaw can be exploited to place a malicious file on disk. \r\n\r\nVersa Networks is not aware of any reported instance where this vulnerability was exploited. Proof of concept for this vulnerability has been disclosed by third party security researchers. \r\n\r\nThere are no workarounds to disable the GUI option. Versa recommends that Director be upgraded to one of the remediated software versions."
},
{
"lang": "es",
"value": "La plataforma de orquestaci\u00f3n Versa Director SD-WAN permite cargar diversos tipos de archivos. Sin embargo, el c\u00f3digo Java que gestiona la carga de archivos contiene una vulnerabilidad de inyecci\u00f3n de argumentos. Al a\u00f1adir argumentos adicionales al nombre del archivo, un atacante puede eludir la validaci\u00f3n de tipo MIME, lo que permite cargar archivos de cualquier tipo. Esta vulnerabilidad puede explotarse para almacenar un archivo malicioso en el disco. Versa Networks no tiene constancia de ning\u00fan caso reportado de explotaci\u00f3n de esta vulnerabilidad. Investigadores de seguridad externos han divulgado una prueba de concepto de esta vulnerabilidad. No existen soluciones alternativas para desactivar la opci\u00f3n de interfaz gr\u00e1fica de usuario (GUI). Versa recomienda actualizar Director a una de las versiones de software corregidas."
}
],
"metrics": {

View File

@ -3,7 +3,7 @@
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-22T18:16:01.170",
"lastModified": "2025-04-23T14:08:13.383",
"vulnStatus": "Awaiting Analysis",
"vulnStatus": "Undergoing Analysis",
"cveTags": [],
"descriptions": [
{

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-4563",
"sourceIdentifier": "jordan@liggitt.net",
"published": "2025-06-23T16:15:27.350",
"lastModified": "2025-06-23T16:15:27.350",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability exists in the NodeRestriction admission controller where nodes can bypass dynamic resource allocation authorization checks. When the DynamicResourceAllocation feature gate is enabled, the controller properly validates resource claim statuses during pod status updates but fails to perform equivalent validation during pod creation. This allows a compromised node to create mirror pods that access unauthorized dynamic resources, potentially leading to privilege escalation."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "jordan@liggitt.net",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 2.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "jordan@liggitt.net",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://github.com/kubernetes/kubernetes/issues/132151",
"source": "jordan@liggitt.net"
},
{
"url": "https://groups.google.com/g/kubernetes-security-announce/c/Zv84LMRuvMQ",
"source": "jordan@liggitt.net"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "Buffer overflow in OpenVPN ovpn-dco-win version 1.3.0 and earlier and version 2.5.8 and earlier allows a local user process to send a too large control message buffer to the kernel driver resulting in a system crash"
},
{
"lang": "es",
"value": "El desbordamiento de b\u00fafer en OpenVPN ovpn-dco-win versi\u00f3n 1.3.0 y anteriores y versi\u00f3n 2.5.8 y anteriores permite que un proceso de usuario local env\u00ede un b\u00fafer de mensaje de control demasiado grande al controlador del kernel, lo que provoca un bloqueo del sistema."
}
],
"metrics": {},

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-52968",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T15:15:29.350",
"lastModified": "2025-06-23T15:15:29.350",
"lastModified": "2025-06-23T17:15:30.990",
"vulnStatus": "Received",
"cveTags": [
{
@ -15,7 +15,7 @@
"descriptions": [
{
"lang": "en",
"value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin."
"value": "xdg-open in xdg-utils through 1.2.1 can send requests containing SameSite=Strict cookies, which can facilitate CSRF. (For example, xdg-open could be modified to, by default, associate x-scheme-handler/https with the execution of a browser with command-line options that arrange for an empty cookie store, although this would add substantial complexity, and would not be considered a desirable or expected behavior by all users.) NOTE: this is disputed because integrations of xdg-open typically do not provide information about whether the xdg-open command and arguments were manually entered by a user, or whether they were the result of a navigation from content in an untrusted origin."
}
],
"metrics": {
@ -45,7 +45,7 @@
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",

View File

@ -0,0 +1,63 @@
{
"id": "CVE-2025-52969",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T17:15:31.137",
"lastModified": "2025-06-23T17:15:31.137",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "ClickHouse 25.7.1.557 allows low-privileged users to execute shell commands by querying existing Executable() tables created by higher-privileged users. Although the CREATE TABLE privilege is restricted, there is no access control preventing low-privileged users from invoking Executable tables already present in the system. If an attacker can influence the contents of the script referenced by the Executable() engine through writable paths, they may execute controlled commands in the context of the ClickHouse server, leading to privilege escalation and unauthorized code execution. NOTE: the Supplier's position is that these types of executions by low-privileged users are the expected behavior."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:N/I:L/A:N",
"baseScore": 2.8,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.1,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-420"
}
]
}
],
"references": [
{
"url": "https://github.com/skraft9/clickhouse-security-research",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6353",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T17:15:41.737",
"lastModified": "2025-06-20T17:15:41.737",
"lastModified": "2025-06-23T16:15:28.043",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in code-projects Responsive Blog 1.0. Affected by this vulnerability is an unknown functionality of the file /search.php. The manipulation of the argument keyword leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como problem\u00e1tica en code-projects Responsive Blog 1.0. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /search.php. La manipulaci\u00f3n de la palabra clave \"argument\" provoca ataques de cross site scripting. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -144,6 +148,10 @@
{
"url": "https://vuldb.com/?submit.597260",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/asd1238525/cve/blob/main/xss2.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6354",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T17:15:41.977",
"lastModified": "2025-06-20T17:15:41.977",
"lastModified": "2025-06-23T16:15:28.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/customer_signup.php. The manipulation of the argument email leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a una funcionalidad desconocida del archivo /function/customer_signup.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597283",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/AlbaDove/cve/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6355",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T17:15:42.217",
"lastModified": "2025-06-20T17:15:42.217",
"lastModified": "2025-06-23T16:15:28.320",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in SourceCodester Online Hotel Reservation System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/execeditroom.php. The manipulation of the argument userid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en SourceCodester Online Hotel Reservation System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /admin/execeditroom.php. La manipulaci\u00f3n del argumento `userid` provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/15",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6356",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T18:15:29.280",
"lastModified": "2025-06-20T18:15:29.280",
"lastModified": "2025-06-23T16:15:28.447",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. This issue affects some unknown processing of the file /addmem.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Este problema afecta a un procesamiento desconocido del archivo /addmem.php. La manipulaci\u00f3n provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597297",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/14",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6358",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T18:15:29.660",
"lastModified": "2025-06-20T18:15:29.660",
"lastModified": "2025-06-23T16:15:28.577",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /saveorder.php. The manipulation of the argument ID leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /saveorder.php. La manipulaci\u00f3n del ID del argumento provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597299",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/12",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6359",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T19:15:37.803",
"lastModified": "2025-06-20T19:15:37.803",
"lastModified": "2025-06-23T16:15:28.707",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Simple Pizza Ordering System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /cashconfirm.php. The manipulation of the argument transactioncode leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0. Se ha clasificado como cr\u00edtica. Este problema afecta a una funcionalidad desconocida del archivo /cashconfirm.php. La manipulaci\u00f3n del argumento transactioncode provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. "
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597300",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/11",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6363",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T20:15:35.003",
"lastModified": "2025-06-20T20:15:35.003",
"lastModified": "2025-06-23T16:15:28.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Simple Pizza Ordering System 1.0. Affected is an unknown function of the file /adding-exec.php. The manipulation of the argument ingname leads to sql injection. It is possible to launch the attack remotely."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Simple Pizza Ordering System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /adding-exec.php. La manipulaci\u00f3n del argumento ingname provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597304",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/7",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6364",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T21:15:22.957",
"lastModified": "2025-06-20T21:15:22.957",
"lastModified": "2025-06-23T16:15:28.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Simple Pizza Ordering System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /adduser-exec.php. The manipulation of the argument Username leads to sql injection. The attack can be launched remotely."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad en code-projects Simple Pizza Ordering System 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /adduser-exec.php. La manipulaci\u00f3n del argumento \"Username\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -140,6 +144,10 @@
{
"url": "https://vuldb.com/?submit.597305",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/rom4j/cve/issues/6",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6365",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T21:15:23.140",
"lastModified": "2025-06-20T21:15:23.140",
"lastModified": "2025-06-23T16:15:29.093",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in HobbesOSR Kitten up to c4f8b7c3158983d1020af432be1b417b28686736 and classified as critical. Affected by this issue is the function set_pte_at in the library /include/arch-arm64/pgtable.h. The manipulation leads to resource consumption. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en HobbesOSR Kitten hasta c4f8b7c3158983d1020af432be1b417b28686736, clasificada como cr\u00edtica. Este problema afecta a la funci\u00f3n set_pte_at de la librer\u00eda /include/arch-arm64/pgtable.h. Esta manipulaci\u00f3n consume recursos. Este producto utiliza la entrega continua con versiones continuas. Por lo tanto, no se dispone de detalles de las versiones afectadas ni de las versiones actualizadas."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
@ -107,7 +111,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +140,10 @@
{
"url": "https://vuldb.com/?submit.597382",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/HobbesOSR/kitten/issues/17",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6367",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T21:15:23.327",
"lastModified": "2025-06-20T21:15:23.327",
"lastModified": "2025-06-23T16:15:29.233",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability was found in D-Link DIR-619L 2.06B01. It has been declared as critical. This vulnerability affects unknown code of the file /goform/formSetDomainFilter. The manipulation of the argument curTime/sched_name_%d/url_%d leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad en D-Link DIR-619L 2.06B01. Se ha declarado cr\u00edtica. Esta vulnerabilidad afecta al c\u00f3digo desconocido del archivo /goform/formSetDomainFilter. La manipulaci\u00f3n del argumento curTime/sched_name_%d/url_%d provoca un desbordamiento del b\u00fafer basado en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -147,6 +151,10 @@
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_67/67.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6372",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T23:15:20.077",
"lastModified": "2025-06-20T23:15:20.077",
"lastModified": "2025-06-23T16:15:29.363",
"vulnStatus": "Received",
"cveTags": [
{
@ -16,6 +16,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in D-Link DIR-619L 2.06B01. This affects the function formSetWizard1 of the file /goform/formSetWizard1. The manipulation of the argument curTime leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en D-Link DIR-619L 2.06B01. Esta afecta a la funci\u00f3n formSetWizard1 del archivo /goform/formSetWizard1. La manipulaci\u00f3n del argumento curTime provoca un desbordamiento del b\u00fafer en la pila. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. Esta vulnerabilidad solo afecta a los productos que ya no reciben soporte del fabricante."
}
],
"metrics": {
@ -66,7 +70,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
@ -114,7 +118,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -147,6 +151,10 @@
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/wudipjq/my_vuln/blob/main/D-Link6/vuln_72/72.md",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6509",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-23T16:15:29.560",
"lastModified": "2025-06-23T16:15:29.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in seaswalker spring-analysis up to 4379cce848af96997a9d7ef91d594aa129be8d71. It has been declared as problematic. Affected by this vulnerability is the function echo of the file /src/main/java/controller/SimpleController.java. The manipulation of the argument Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250609-01/report.md#steps-to-reproduce",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313621",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592962",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6510",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-23T16:15:29.770",
"lastModified": "2025-06-23T16:15:29.770",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Netgear EX6100 1.0.2.28_1.1.138. It has been rated as critical. Affected by this issue is the function sub_415EF8. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6100-netgear#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313622",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313622",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593678",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.595995",
"source": "cna@vuldb.com"
},
{
"url": "https://www.netgear.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6511",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-23T17:15:32.347",
"lastModified": "2025-06-23T17:15:32.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in Netgear EX6150 1.0.0.46_1.0.76. This affects the function sub_410090. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-ex6150-netgear#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313623",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313623",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.595999",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.596008",
"source": "cna@vuldb.com"
},
{
"url": "https://www.netgear.com/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6516",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-23T17:15:32.550",
"lastModified": "2025-06-23T17:15:32.550",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in HDF5 up to 1.14.6 and classified as critical. This vulnerability affects the function H5F_addr_decode_len of the file /hdf5/src/H5Fint.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/HDFGroup/hdf5/issues/5581",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/20626851/reproduce.tar.gz",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313636",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313636",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592589",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-23T16:00:28.688260+00:00
2025-06-23T18:00:26.982876+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-23T15:25:05.683000+00:00
2025-06-23T17:15:32.550000+00:00
```
### Last Data Feed Release
@ -33,59 +33,55 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299091
299102
```
### CVEs added in the last Commit
Recently added CVEs: `15`
Recently added CVEs: `11`
- [CVE-2023-47297](CVE-2023/CVE-2023-472xx/CVE-2023-47297.json) (`2025-06-23T15:15:25.940`)
- [CVE-2023-47298](CVE-2023/CVE-2023-472xx/CVE-2023-47298.json) (`2025-06-23T15:15:26.700`)
- [CVE-2023-48978](CVE-2023/CVE-2023-489xx/CVE-2023-48978.json) (`2025-06-23T15:15:26.890`)
- [CVE-2025-2171](CVE-2025/CVE-2025-21xx/CVE-2025-2171.json) (`2025-06-23T14:15:26.437`)
- [CVE-2025-2172](CVE-2025/CVE-2025-21xx/CVE-2025-2172.json) (`2025-06-23T14:15:26.607`)
- [CVE-2025-46101](CVE-2025/CVE-2025-461xx/CVE-2025-46101.json) (`2025-06-23T15:15:27.793`)
- [CVE-2025-48700](CVE-2025/CVE-2025-487xx/CVE-2025-48700.json) (`2025-06-23T15:15:27.930`)
- [CVE-2025-52542](CVE-2025/CVE-2025-525xx/CVE-2025-52542.json) (`2025-06-23T14:15:26.753`)
- [CVE-2025-52875](CVE-2025/CVE-2025-528xx/CVE-2025-52875.json) (`2025-06-23T15:15:28.260`)
- [CVE-2025-52876](CVE-2025/CVE-2025-528xx/CVE-2025-52876.json) (`2025-06-23T15:15:28.447`)
- [CVE-2025-52877](CVE-2025/CVE-2025-528xx/CVE-2025-52877.json) (`2025-06-23T15:15:28.603`)
- [CVE-2025-52878](CVE-2025/CVE-2025-528xx/CVE-2025-52878.json) (`2025-06-23T15:15:28.770`)
- [CVE-2025-52879](CVE-2025/CVE-2025-528xx/CVE-2025-52879.json) (`2025-06-23T15:15:28.933`)
- [CVE-2025-52967](CVE-2025/CVE-2025-529xx/CVE-2025-52967.json) (`2025-06-23T15:15:29.163`)
- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T15:15:29.350`)
- [CVE-2023-47031](CVE-2023/CVE-2023-470xx/CVE-2023-47031.json) (`2025-06-23T17:15:27.313`)
- [CVE-2023-47032](CVE-2023/CVE-2023-470xx/CVE-2023-47032.json) (`2025-06-23T16:15:23.920`)
- [CVE-2023-47294](CVE-2023/CVE-2023-472xx/CVE-2023-47294.json) (`2025-06-23T16:15:24.493`)
- [CVE-2023-47295](CVE-2023/CVE-2023-472xx/CVE-2023-47295.json) (`2025-06-23T16:15:24.623`)
- [CVE-2023-50450](CVE-2023/CVE-2023-504xx/CVE-2023-50450.json) (`2025-06-23T16:15:24.743`)
- [CVE-2025-4563](CVE-2025/CVE-2025-45xx/CVE-2025-4563.json) (`2025-06-23T16:15:27.350`)
- [CVE-2025-52969](CVE-2025/CVE-2025-529xx/CVE-2025-52969.json) (`2025-06-23T17:15:31.137`)
- [CVE-2025-6509](CVE-2025/CVE-2025-65xx/CVE-2025-6509.json) (`2025-06-23T16:15:29.560`)
- [CVE-2025-6510](CVE-2025/CVE-2025-65xx/CVE-2025-6510.json) (`2025-06-23T16:15:29.770`)
- [CVE-2025-6511](CVE-2025/CVE-2025-65xx/CVE-2025-6511.json) (`2025-06-23T17:15:32.347`)
- [CVE-2025-6516](CVE-2025/CVE-2025-65xx/CVE-2025-6516.json) (`2025-06-23T17:15:32.550`)
### CVEs modified in the last Commit
Recently modified CVEs: `95`
Recently modified CVEs: `27`
- [CVE-2025-6406](CVE-2025/CVE-2025-64xx/CVE-2025-6406.json) (`2025-06-23T15:15:31.280`)
- [CVE-2025-6407](CVE-2025/CVE-2025-64xx/CVE-2025-6407.json) (`2025-06-23T15:15:31.400`)
- [CVE-2025-6408](CVE-2025/CVE-2025-64xx/CVE-2025-6408.json) (`2025-06-23T15:15:31.527`)
- [CVE-2025-6413](CVE-2025/CVE-2025-64xx/CVE-2025-6413.json) (`2025-06-23T15:15:31.657`)
- [CVE-2025-6414](CVE-2025/CVE-2025-64xx/CVE-2025-6414.json) (`2025-06-23T15:15:31.800`)
- [CVE-2025-6415](CVE-2025/CVE-2025-64xx/CVE-2025-6415.json) (`2025-06-23T15:15:31.930`)
- [CVE-2025-6416](CVE-2025/CVE-2025-64xx/CVE-2025-6416.json) (`2025-06-23T15:15:32.057`)
- [CVE-2025-6417](CVE-2025/CVE-2025-64xx/CVE-2025-6417.json) (`2025-06-23T15:15:32.183`)
- [CVE-2025-6418](CVE-2025/CVE-2025-64xx/CVE-2025-6418.json) (`2025-06-23T15:15:32.307`)
- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-23T15:15:32.433`)
- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-23T15:15:32.560`)
- [CVE-2025-6421](CVE-2025/CVE-2025-64xx/CVE-2025-6421.json) (`2025-06-23T15:15:32.680`)
- [CVE-2025-6452](CVE-2025/CVE-2025-64xx/CVE-2025-6452.json) (`2025-06-23T15:15:32.813`)
- [CVE-2025-6453](CVE-2025/CVE-2025-64xx/CVE-2025-6453.json) (`2025-06-23T15:15:32.937`)
- [CVE-2025-6455](CVE-2025/CVE-2025-64xx/CVE-2025-6455.json) (`2025-06-23T15:15:33.073`)
- [CVE-2025-6456](CVE-2025/CVE-2025-64xx/CVE-2025-6456.json) (`2025-06-23T15:15:33.230`)
- [CVE-2025-6457](CVE-2025/CVE-2025-64xx/CVE-2025-6457.json) (`2025-06-23T15:15:33.357`)
- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-23T15:15:33.497`)
- [CVE-2025-6466](CVE-2025/CVE-2025-64xx/CVE-2025-6466.json) (`2025-06-23T15:15:34.440`)
- [CVE-2025-6467](CVE-2025/CVE-2025-64xx/CVE-2025-6467.json) (`2025-06-23T14:15:27.473`)
- [CVE-2025-6477](CVE-2025/CVE-2025-64xx/CVE-2025-6477.json) (`2025-06-23T14:15:28.330`)
- [CVE-2025-6498](CVE-2025/CVE-2025-64xx/CVE-2025-6498.json) (`2025-06-23T14:15:28.950`)
- [CVE-2025-6499](CVE-2025/CVE-2025-64xx/CVE-2025-6499.json) (`2025-06-23T14:15:29.077`)
- [CVE-2025-6500](CVE-2025/CVE-2025-65xx/CVE-2025-6500.json) (`2025-06-23T14:15:29.207`)
- [CVE-2025-6501](CVE-2025/CVE-2025-65xx/CVE-2025-6501.json) (`2025-06-23T14:15:29.337`)
- [CVE-2025-23121](CVE-2025/CVE-2025-231xx/CVE-2025-23121.json) (`2025-06-19T00:15:21.260`)
- [CVE-2025-23168](CVE-2025/CVE-2025-231xx/CVE-2025-23168.json) (`2025-06-19T00:15:21.377`)
- [CVE-2025-23169](CVE-2025/CVE-2025-231xx/CVE-2025-23169.json) (`2025-06-19T00:15:21.497`)
- [CVE-2025-23170](CVE-2025/CVE-2025-231xx/CVE-2025-23170.json) (`2025-06-19T00:15:21.620`)
- [CVE-2025-23171](CVE-2025/CVE-2025-231xx/CVE-2025-23171.json) (`2025-06-19T00:15:21.743`)
- [CVE-2025-23172](CVE-2025/CVE-2025-231xx/CVE-2025-23172.json) (`2025-06-19T00:15:21.857`)
- [CVE-2025-23173](CVE-2025/CVE-2025-231xx/CVE-2025-23173.json) (`2025-06-19T00:15:21.977`)
- [CVE-2025-24286](CVE-2025/CVE-2025-242xx/CVE-2025-24286.json) (`2025-06-19T00:15:22.093`)
- [CVE-2025-24287](CVE-2025/CVE-2025-242xx/CVE-2025-24287.json) (`2025-06-19T00:15:22.207`)
- [CVE-2025-24288](CVE-2025/CVE-2025-242xx/CVE-2025-24288.json) (`2025-06-19T00:15:22.323`)
- [CVE-2025-24291](CVE-2025/CVE-2025-242xx/CVE-2025-24291.json) (`2025-06-19T00:15:22.437`)
- [CVE-2025-43947](CVE-2025/CVE-2025-439xx/CVE-2025-43947.json) (`2025-04-23T14:08:13.383`)
- [CVE-2025-50054](CVE-2025/CVE-2025-500xx/CVE-2025-50054.json) (`2025-06-20T07:15:26.367`)
- [CVE-2025-52968](CVE-2025/CVE-2025-529xx/CVE-2025-52968.json) (`2025-06-23T17:15:30.990`)
- [CVE-2025-6353](CVE-2025/CVE-2025-63xx/CVE-2025-6353.json) (`2025-06-23T16:15:28.043`)
- [CVE-2025-6354](CVE-2025/CVE-2025-63xx/CVE-2025-6354.json) (`2025-06-23T16:15:28.183`)
- [CVE-2025-6355](CVE-2025/CVE-2025-63xx/CVE-2025-6355.json) (`2025-06-23T16:15:28.320`)
- [CVE-2025-6356](CVE-2025/CVE-2025-63xx/CVE-2025-6356.json) (`2025-06-23T16:15:28.447`)
- [CVE-2025-6358](CVE-2025/CVE-2025-63xx/CVE-2025-6358.json) (`2025-06-23T16:15:28.577`)
- [CVE-2025-6359](CVE-2025/CVE-2025-63xx/CVE-2025-6359.json) (`2025-06-23T16:15:28.707`)
- [CVE-2025-6363](CVE-2025/CVE-2025-63xx/CVE-2025-6363.json) (`2025-06-23T16:15:28.830`)
- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-23T16:15:28.960`)
- [CVE-2025-6365](CVE-2025/CVE-2025-63xx/CVE-2025-6365.json) (`2025-06-23T16:15:29.093`)
- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-23T16:15:29.233`)
- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-23T16:15:29.363`)
## Download and Usage

View File

@ -138435,7 +138435,7 @@ CVE-2019-2479,0,0,e0c7a602157a3a3233e2924456cab0b3e874e1a14c59e46b40d40a581b865b
CVE-2019-2480,0,0,6eea42436df236a96df3c2182dde88be080c2d91d3678fb57a7c2f7ad95e7702,2024-11-21T04:40:57.403000
CVE-2019-2481,0,0,2c7f842fe90c4c9c7c6cf8044eaff1b070218ab2ebd7b7b65afbfc4acbbc5150,2024-11-21T04:40:57.523000
CVE-2019-2482,0,0,60afa5b90bf8c3578bc6106e4f975267fcbb563b3067e9521d1bdccda2a87afd,2024-11-21T04:40:57.660000
CVE-2019-2483,0,1,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000
CVE-2019-2483,0,0,188ec2ef5d16f6941794dea2b1c3928f0252c43dadd311428b3a69b6703d371a,2025-06-23T15:21:09.487000
CVE-2019-2484,0,0,a7715493c3547f6d9e809f816d1813c2921c76b2c7dc1546f30b1b68849ed9de,2024-11-21T04:40:57.780000
CVE-2019-2485,0,0,76d018af106f8af9fdc20711cbfe38a23bc7f9c5c4b44cb18c66175ee6e482c3,2024-11-21T04:40:57.893000
CVE-2019-2486,0,0,4d94fca994706eacfa9aa52f25dc23c95c1e49d831e7a7b89436c2cc7cb6710b,2024-11-21T04:40:58.017000
@ -237901,6 +237901,8 @@ CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
CVE-2023-47031,1,1,a8e93fd51520b4974986e0b69c7c4ddc9e00a730f0784dd85cdf7e2d377ab9fe,2025-06-23T17:15:27.313000
CVE-2023-47032,1,1,88713d4ca136a466d014f7b97f26f67b61fc67d85e63960eae1c5bf38e727a10,2025-06-23T16:15:23.920000
CVE-2023-47033,0,0,617818e306c20ade59924bf4bbac6b004808fa5a2cfbab4ec0f03a5ee1b8b8ca,2025-05-30T15:15:23.810000
CVE-2023-47034,0,0,6a1f244f30344c3a3a74d180948a6a04b3859761d9cd9932f89f0d7068dfd697,2024-11-21T08:29:38.427000
CVE-2023-47035,0,0,81ca6ef6853b599b11605e195d2498aff6e67a10accc5ef3988bd57869c19cef,2025-05-30T15:15:24.013000
@ -238131,8 +238133,10 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
CVE-2023-47297,1,1,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000
CVE-2023-47298,1,1,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000
CVE-2023-47294,1,1,d8554dad4af058ac7998498e3eedba8cdbc3a03f6ba24980226a84f041a77ee1,2025-06-23T16:15:24.493000
CVE-2023-47295,1,1,c0f92ae71b07a596eeb84a282b19c906d3be5203af9c2dd26e2f399bd7b5deb9,2025-06-23T16:15:24.623000
CVE-2023-47297,0,0,bbc46bc58ac1926acbf94fee7d212b14084705214e921a768d0e141589037753,2025-06-23T15:15:25.940000
CVE-2023-47298,0,0,9592c320400df1379afbda3cccc4c0739e5987b5988942cfee940d4537d295e3,2025-06-23T15:15:26.700000
CVE-2023-4730,0,0,f9bd47caac18f229be27cadc18d87104be690bdb4cd5c89d5981d2f7932f458a,2024-08-19T13:00:23.117000
CVE-2023-47304,0,0,db46d98bf37576c1ea41928ed0e02027d39d0face4fca78440b8bb53d0e89930,2024-11-21T08:30:07.553000
CVE-2023-47307,0,0,112c4fcd2316630545c0b8214cf0e27b8ce26f6bb0e9c99277c68ca8f2b8777e,2024-11-21T08:30:07.700000
@ -239415,7 +239419,7 @@ CVE-2023-48966,0,0,c88c2027c13e6fd2aaa41bb08a633ab1482cdd3b1061751f9ee7fc5ae02c4
CVE-2023-48967,0,0,1cd351e34d0367ca1f2c697aa81b0efac29357ca75fe471f5d64e2558fda969d,2024-11-21T08:32:40.463000
CVE-2023-4897,0,0,07a390e0b63403258ae68e36ca13ea1f5f83204b2e2ad36e8736ce5043b6943d,2024-11-21T08:36:12.803000
CVE-2023-48974,0,0,e5c2b099db521bf37d9fbf8a5d47d0a5c7f75b442894bf87ae88502412b1de09,2025-06-17T16:15:24.747000
CVE-2023-48978,1,1,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000
CVE-2023-48978,0,0,4f3036d1d6e93e4a5c04bc12686605e2756472c9169b822786ca695526c6e352,2025-06-23T15:15:26.890000
CVE-2023-4898,0,0,f47d5fad93de142b0e520dbe68d4d69341d7e4d308a26e168d2cf20373685375,2024-11-21T08:36:12.940000
CVE-2023-48985,0,0,6085ceaceb9bc984350ad484b7164b84ca1f82a570dc5327d198eae93291cec3,2025-03-19T15:15:45.800000
CVE-2023-48986,0,0,ff6e6738309e970dc01f18950378d453c2d15ac175ea278c464f5c9442a4fb5e,2025-03-20T14:15:16.100000
@ -240470,6 +240474,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01
CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000
CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000
CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000
CVE-2023-50450,1,1,867f50ca34f4d8ba1ae4eaf000c11978a0190ed0a8351ab251387cb32cfdee12,2025-06-23T16:15:24.743000
CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000
CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000
CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000
@ -251102,7 +251107,7 @@ CVE-2024-21202,0,0,a82724b3e343bc702e27e8d6ce800a916f4b3f0e013f2e090965b5628d482
CVE-2024-21203,0,0,479844f4f758f4b28553f6669f6d21014910b665e890542aa411088e0f38c63f,2025-03-13T14:15:21.097000
CVE-2024-21204,0,0,6e02d97c4802b20054f3c4f36b4262d4579d51c4dad414b899b7f47595986f74,2025-03-13T17:15:27.480000
CVE-2024-21205,0,0,e1826db3e18237be6dde03d7d4cc539b869d1360faa558be8561f743abd88176,2025-03-13T14:15:21.243000
CVE-2024-21206,0,1,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000
CVE-2024-21206,0,0,5b3a3f55f1e6e545de7db76a69922b7ae6c94d3fb1466d27fe145646e96fd1ec,2025-06-23T15:20:13.090000
CVE-2024-21207,0,0,8943a78a85322e8f74ca9bb8757d973fc6062abdbe462a9e329a926ce38d871e,2025-03-13T14:15:21.393000
CVE-2024-21208,0,0,96a0dfd3930260cb1ded2610d57bb643c42ac376ae3a0ee18e6cec14bc49e47c,2025-06-18T20:27:14.790000
CVE-2024-21209,0,0,9f9125b2f59e97ee383b40b643ff87dbadc96541830a9dd6f1bb5908b73c9c56,2025-03-13T16:15:15.907000
@ -252359,7 +252364,7 @@ CVE-2024-22648,0,0,bf371e82e6b8ba69838a85189fd7c617dc96a67937ae928aae96b0e09af69
CVE-2024-2265,0,0,2d9e3f6a8940d91c300a26e60fbafd657c57a52b99326912de499462a5a33db6,2025-03-11T16:53:59.010000
CVE-2024-22651,0,0,e469381682c5eb450c79d9b6a70a064ab830cecb8e16bcfbc6f7459206453c7f,2024-11-21T08:56:32.580000
CVE-2024-22653,0,0,9327c4eeb2944373f4b4615e203889d4d97ef3692e8a64646c097e9e2e698468,2025-06-18T23:57:03.917000
CVE-2024-22654,0,1,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000
CVE-2024-22654,0,0,b5f28c7505e5161dc090323e656849833aaca3354ed25a0241d10af1c9ac0770,2025-06-23T14:42:44.127000
CVE-2024-2266,0,0,95d5ae8a3d9367be388b5604e19ba904305ae510fd4151f2cfa0ff7fb43bf84e,2025-03-11T16:53:46.840000
CVE-2024-22660,0,0,2311a8f71be31bc2d8e245fbbdb3d3cc97a05fbb5d0aad28b28032e7f069aa6a,2024-11-21T08:56:32.850000
CVE-2024-22662,0,0,d4858e76cafd8f287aa01b60da8f3daccb222e3defcae1979c4c8e9edd2bdc30,2024-11-21T08:56:33.027000
@ -267710,7 +267715,7 @@ CVE-2024-42556,0,0,ac1b4152bf99bca20ae35623d62f61452a39fb306fbbee858a0a5374f0e4f
CVE-2024-42557,0,0,b692a3b0466194a416876ee66549e1bd8b2c7e51a5c1228110019b0c078e3135,2025-06-05T20:18:43.920000
CVE-2024-42558,0,0,ddd5492e2b52bc68def78917541ff4f0fd5129fe9226419b3f94cbbe242b143c,2025-06-05T20:18:30.253000
CVE-2024-42559,0,0,f7187969dab6ad6558e1754351d11efdd6752164963d45cc6208ae6834946dcc,2024-08-20T19:35:10.850000
CVE-2024-4256,0,1,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000
CVE-2024-4256,0,0,56904d042cfcc221e9be33135d7de9b9558ad7f73caf11075c2a329d49e0946a,2025-06-23T15:07:20.147000
CVE-2024-42560,0,0,d8e63dfccffe358d8f5f12e10d5c3bdb3d80b3adec563f71c08b10512ad5a438,2025-06-05T20:18:17.887000
CVE-2024-42561,0,0,d70955b1d40eb54377d8e12e382907c01dc23b672669cb749222161095d7676d,2025-06-05T20:18:01.470000
CVE-2024-42562,0,0,4d5f095c6cbd840b865bd2919364e7e80c3562dd9684dd1b1a5a56be9c16cd36,2025-06-05T20:17:49.820000
@ -269713,7 +269718,7 @@ CVE-2024-45204,0,0,c17d724ab71326993fc885d0d9808c0b2eaae94c47b7923f22dde16d2eff6
CVE-2024-45205,0,0,a10f061421a2a3424e1b6c374ce4a524c46fcb2bdda2afd1dfd63ddbb6391abd,2024-12-04T17:15:14.330000
CVE-2024-45206,0,0,d9e968acf0dd8b42fc18894be4d96b31b86b907e5133e5110d37345500c02d41,2025-03-13T19:15:48.013000
CVE-2024-45207,0,0,c6ee04eede270568245ffcec461ab781dd5d887b6f188268b86eaa3a09be9e39,2024-12-04T16:15:25.580000
CVE-2024-45208,0,0,7215a369507849f231782490b34d0cc67523c6bd551d9fefc6a31e8c75e86c05,2025-06-19T00:15:21.097000
CVE-2024-45208,0,1,256de394a286effeb23e2b86009f8754ccf8a94ed80f865cd5be862bae035361,2025-06-19T00:15:21.097000
CVE-2024-4521,0,0,4a1a789411022da9e12743f86f636c858525a8f77c0a3180e65a51191dfff476,2025-02-19T18:01:20.563000
CVE-2024-45216,0,0,0c858a01ee35c91ac1e5a46b34b1bd78a3671b8c7c394b48bf0907856ecc77c6,2024-11-21T09:37:28.690000
CVE-2024-45217,0,0,6810c24892f2494e2f2c08a71fcaf1b8b72831c7bb6f78dcca7b6cc985b451a7,2024-11-21T09:37:28.897000
@ -272196,7 +272201,7 @@ CVE-2024-48758,0,0,c09d45b53d733862ccc897703fc7912f82231522c6286fcce4bbe3e958aaf
CVE-2024-4876,0,0,65d8065cbe56070f462c8629050b655fbc478bb065b4ab8ba51acd1e3033dac7,2025-01-24T13:44:58.993000
CVE-2024-48760,0,0,c9b65d5513092443fa283195a16f32efdb1113d6591583c1dbffd494c29d665e,2025-06-06T15:40:58.640000
CVE-2024-48761,0,0,1f5cd512aaf966e4ccb5e27fcd626f0bc8944acedd5c7d09423e312b2b471403,2025-05-23T15:26:18.807000
CVE-2024-48766,0,1,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000
CVE-2024-48766,0,0,e39ed20bafa07adf6686698f28b3f9379175cabb32d358913bf8f98cf8307264,2025-06-23T14:59:36.530000
CVE-2024-48768,0,0,20dc94e5053f6f0d8d7caf706bf6fcb813042430158ff64dc7ecde51efb03a2d,2024-10-15T21:35:32.950000
CVE-2024-48769,0,0,881e0b4b29e63d860dc80c7571762519af749fe3f9ba6f317c2855a4a66d7008,2024-10-15T19:35:39.423000
CVE-2024-4877,0,0,8ee4a62119f4539bb72579c9037b385657424188b9828b8e94e3040efd347d3a,2025-04-29T19:45:07.223000
@ -274368,7 +274373,7 @@ CVE-2024-51530,0,0,7cd040cc53d7ba42e6f6d453f4d18993a534b39a2754ee99e99110d754af3
CVE-2024-51532,0,0,2d809e858826663dfe9250848bf54d1d67a303ccaea30e096202fdbcd858496e,2025-01-29T21:06:51.663000
CVE-2024-51534,0,0,119c8ca4d836cf97fc773cbb645e954f693ae364266f1264b856ae256ade04e3,2025-02-07T19:58:25.567000
CVE-2024-51539,0,0,b1af50f63ad59511e4a92be40db02a7d120fd35939f783b0ad1dc1ad8e6b0102,2025-02-25T14:15:31.153000
CVE-2024-5154,0,1,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000
CVE-2024-5154,0,0,9f3086a91e7d0f61e04cc464c2ac0ea5eaf14623ec838410d0539c97fd02a63e,2025-06-23T14:15:26.073000
CVE-2024-51540,0,0,96d82dbba2ebe404a1a2ea6174b3264f3b486447b0ab540d34ad70a82a5fc066,2025-01-21T21:30:52.310000
CVE-2024-51541,0,0,6701a109dfadee0bf9df2ae076263677d2273867a4cd8d4999c49830cdf3286f,2025-02-27T17:18:41.483000
CVE-2024-51542,0,0,51af5b7f493e16046a0353b6dff1f03aa6634aedd1a41c0133f8ad01785b2f85,2025-04-10T19:42:05.967000
@ -274780,7 +274785,7 @@ CVE-2024-51926,0,0,3af7d3be4c078e7a2de285bfa5deb879d2e999b541df90a9975702e0878d6
CVE-2024-51927,0,0,106ca5e27a288e356fd6a7e911b64c6dfd5b7ba7258e70ff09080ea37925fb43,2024-11-19T21:56:45.533000
CVE-2024-51928,0,0,906f674464392bc223ac1e1b1f01be2b3080856baabf09c25d67edd7c45b67c3,2024-11-19T21:56:45.533000
CVE-2024-51929,0,0,cb4911d106197ddce6c702f19e318e44410a8bbb68de3fb535dfd76509b3dbdb,2024-11-19T21:56:45.533000
CVE-2024-5193,0,1,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000
CVE-2024-5193,0,0,ada3fbebfaa0bf71e803ea79382652bd82216c98f085d92a28d242464f32570c,2025-06-23T15:07:25.363000
CVE-2024-51930,0,0,6a6f30179b2f818a5fbde14015f3085c671c58bd758c9148a860135e38246cda,2024-11-19T21:56:45.533000
CVE-2024-51931,0,0,f1806da64751fc947a9be6b715414a5533bb8bd4b1043efa5b37487df572a9bc,2024-11-19T21:56:45.533000
CVE-2024-51932,0,0,55673a62a416277babc704dc3092cc11640b7d2ab527b4db9563155a69c67e6a,2024-11-19T21:56:45.533000
@ -276840,7 +276845,7 @@ CVE-2024-54767,0,0,8c4bab4764e9a141ba548ee86cbb68266367c0b9186821635463f547e3a12
CVE-2024-54772,0,0,91a3697268affbf0eb80fdd37decc58bf196ba083d66dc0e72ebb567f63733a6,2025-02-24T16:15:12.213000
CVE-2024-54774,0,0,f4729f792bb626d0ad63a36553265557f43246eb9e15e58f6f629c134348456d,2025-04-21T17:00:56.877000
CVE-2024-54775,0,0,03de079a7c10eead9e4af05c09468a6683068e1ea25d6b843a97d0b7fa560373,2025-04-22T15:46:43.310000
CVE-2024-54779,0,1,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000
CVE-2024-54779,0,0,0f2e3f4d67ddf5fdef30e273f194ac7d1055ab45d5be390367bd1f63c0a8c033,2025-06-23T14:51:38.127000
CVE-2024-5478,0,0,db0e3beae9848430f36a4effd5045d24657a32915031caa2ccdcaa2667957312,2024-11-21T09:47:45.637000
CVE-2024-54780,0,0,97aeac9148437d0ba8a5fd67ab0a34cd99c35df10abeb3e7cb7208a15fc9f6c4,2025-06-13T13:03:51.367000
CVE-2024-5479,0,0,f92bceb83a5a9014c15956c2e58b8be8249c2eaaa0c8984e346563da1cce7cef,2024-11-21T09:47:45.750000
@ -278231,7 +278236,7 @@ CVE-2024-57261,0,0,26a9b2d5b7ff5b622e87fcd3863f1f802b79a7b6bbd571d956e44c1603185
CVE-2024-57262,0,0,9fe2f40763eda4120983592ae7a5e38429477dc711d137d5de6a923fed11e57b,2025-02-19T02:15:08.677000
CVE-2024-5727,0,0,fa88f56a97866359bbc0b65df783d5b0244efde0cef8aa399c3e096ccc969a63,2025-05-19T20:47:23.443000
CVE-2024-57272,0,0,dbc324cdb83c481b4de69dd5fc8cc4b86ee368b27cc30cc7365a1b8df8dc0a02,2025-01-28T20:15:54.870000
CVE-2024-57273,0,1,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000
CVE-2024-57273,0,0,42528cdfe2635b7b90df075849cf292a0caf64eda2c4e5c47fd4162c44013aec,2025-06-23T14:50:34.313000
CVE-2024-57276,0,0,21b620c07e0e3337064dc5d61a9e1c6b46709ad965f39dbfecad11193ff5bb9d,2025-01-30T22:15:09.297000
CVE-2024-57277,0,0,bb68fea6cbebd0a104ef91fc94412518559f48ccb229cfa7844f6afcc432f01f,2025-02-05T17:15:21.863000
CVE-2024-57278,0,0,5802b511c82f2f71ef9a786cc45e5ccdffc451e02dca104a266adf57fe298a49,2025-02-07T23:15:14.230000
@ -281379,7 +281384,7 @@ CVE-2024-8519,0,0,6d09c03bb5c0676e2db6d7de8b2d6bfb1c8c549009d82d08f9b45ce64c552e
CVE-2024-8520,0,0,ee5e313bdd2082e7ac0347f97a4f567f3e181986d8d2c028c9afe06673efefeb,2024-10-08T21:50:30.153000
CVE-2024-8521,0,0,f9b371241b659e5641a68121d0175d4d79935b6aa87350515395e868afaa92d1,2025-06-04T16:56:10.697000
CVE-2024-8522,0,0,3ac21e73fb1c10b4b5ed0e52a198a17bd9ec825a9c6d4ed8383caff4ddd53d99,2024-09-13T16:12:30.497000
CVE-2024-8523,0,1,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000
CVE-2024-8523,0,0,44421ed02bc08ce2faed0d67ae6d1aba60b9f198d27b1b8b06fe7bf129d33e7a,2025-06-23T15:07:51.127000
CVE-2024-8524,0,0,33b79bd5f5f8b1f6caea1361e2709fb9f6e9ffdb86bbfb1fd17fb49f4b2255d5,2025-04-01T20:31:52.367000
CVE-2024-8525,0,0,e40fe06cb9d6da5dea832197d70784a726c2e86485a80664114babe1f94175e1,2024-11-21T16:15:27.217000
CVE-2024-8526,0,0,87a88335b350126bc897aa9b90f3452321356859016838db3ea06327abc68688,2024-11-21T16:15:27.437000
@ -283835,7 +283840,7 @@ CVE-2025-1373,0,0,77cfaa3a6771902b072de962115d7552a47b140ae8333a2256741e5279e5fe
CVE-2025-1374,0,0,cadb80f4dd4c990bddb9a04d1d5b86061bf8cb9c94d8d0e9a8e4622fd190d028,2025-02-24T12:39:38.450000
CVE-2025-1376,0,0,2b2b61cbe13de588e58e77dbd2d6ba8599c2b392d8f7811bef18ce22646e2214,2025-02-17T05:15:09.807000
CVE-2025-1377,0,0,19be1f82dafea985fb389f6935710bf6fb3889bba10c10bc1ad76bf361c5c361,2025-02-17T05:15:10.090000
CVE-2025-1378,0,1,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000
CVE-2025-1378,0,0,7b0b1440e8634b58b74747d3b86a48aac3845e3d771526460c32a15ff40576ad,2025-06-23T14:37:28.747000
CVE-2025-1379,0,0,5dcb3165f40d5545ed4ce19a6009cd3b7b7246346d15ef8a292528f915f8199d,2025-04-02T18:44:42.610000
CVE-2025-1380,0,0,6bd04dd2008ea0079e8919e2e53c4972b6e83c3f4c56a4b8715e29739c2e265b,2025-04-02T19:01:09.913000
CVE-2025-1381,0,0,0527ab2734ccec4269c70fb2d0d40ea59b49fa3f3723a4356fee1835e38fef1a,2025-04-11T18:38:03.400000
@ -284287,7 +284292,7 @@ CVE-2025-1920,0,0,fe1bfe7d3968a4bee0153a90d7c96939434eef45f8e8313d77416606c59a2b
CVE-2025-1921,0,0,ba74c018bcf5faf8a06ccf49ccb3d218a4283defa0404c6fedf537f78ae8c0db,2025-04-01T20:42:02.037000
CVE-2025-1922,0,0,ffe3afa46e41291810fea1180110899b162ac00bfd72f4ed17aed7281078e346,2025-04-01T20:41:48.893000
CVE-2025-1923,0,0,6582409071430538ff195b4cf1ccfbfda63320893f755839ae619a5289f82d8c,2025-04-01T20:41:40.067000
CVE-2025-1925,0,1,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000
CVE-2025-1925,0,0,ed33e020c6c799e97809a4da2f8b3e738413c3ef2ebfe4deea0f92aa1a0fd65e,2025-06-23T15:10:37.883000
CVE-2025-1926,0,0,4221b375af30e7037e93f37efe9c0a6378338767f4a8a8f0236af0d6a028f3db,2025-05-26T02:32:26.917000
CVE-2025-1930,0,0,e27d05864f3d9f6ebafc49ef3fedf20597ddb9434fbbf0c2cd1b8fbc38c09f10,2025-04-04T15:16:09.610000
CVE-2025-1931,0,0,af8164fe526ea731987cc7549eea9e98de73d45458537b9e7803f34ece876fe1,2025-04-03T13:29:22.950000
@ -284497,7 +284502,7 @@ CVE-2025-20184,0,0,9eb256a52263cf40f2a0e3559972cb02a910d9338675658a6b6e99c16dd38
CVE-2025-20185,0,0,d91cdec4770a3b57d38bd59b46eef47ee3c325e1ce185af9d0c0b74204bb3b1c,2025-02-05T17:15:25.883000
CVE-2025-20186,0,0,988f7f1d2645d1b97028fb13ba80ac27036d7d2054583bffc040f1b4de466626,2025-05-08T14:39:09.683000
CVE-2025-20187,0,0,49cb1bb2460f1bf94d25f953e4816fb4704910b25f07a14f891f757e44af242f,2025-05-08T14:39:09.683000
CVE-2025-20188,0,1,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000
CVE-2025-20188,0,0,80a0c043db9ae0ef650c538fc232514e7650309e09c1117b267293be7fa27255,2025-06-23T15:15:11.117000
CVE-2025-20189,0,0,80748ec81ef3d0bfea0a8fd1c737694e12cc44ced3d0cbf30c347d4a66ab6799,2025-05-08T14:39:09.683000
CVE-2025-2019,0,0,ce7a9cbc0a7eb98392e8b644905555ade42dac13612963c992df55a4ab3df595,2025-03-11T21:15:53.337000
CVE-2025-20190,0,0,469a86e281a91f6666aba5167ba034aae7aaa490b577c894f7d420858aa81096,2025-05-08T14:39:09.683000
@ -285180,7 +285185,7 @@ CVE-2025-2148,0,0,d4190a3f054e2420a8d60bda0390077417613c29dc75da593352ca97816f8b
CVE-2025-21480,0,0,6948132d528c7804139999300020de3a6192ffe9f450494845d5e5c5a7c138cc,2025-06-04T17:24:26.927000
CVE-2025-21485,0,0,03d83e3b9947fa20b8c4220c62d45e20f0436065a3a3d3554a8beeb69e71c0fa,2025-06-04T14:54:33.783000
CVE-2025-21486,0,0,6657ae7f3cc111f37509795b42a9ee2f1a625afcb0e5375a7c1283ba109a4c1b,2025-06-04T14:54:33.783000
CVE-2025-21489,0,1,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000
CVE-2025-21489,0,0,3e868db9a0a2c09e7628e20d55caa1b9b3f67be100045162493f134e3c4ef116,2025-06-23T15:21:28.207000
CVE-2025-2149,0,0,d7df4a69e494fa588a972d8a9b2091768f937c9cdd73a96cb132062cdf0f66aa,2025-03-10T14:15:26.267000
CVE-2025-21490,0,0,b59bfaf73f4a7aac7f498efe2114db1737794c6dd1c56d41aa09f498e00d23bb,2025-04-09T16:06:52.400000
CVE-2025-21491,0,0,4c71536c040f797c835de923bbd00b182f1ac6ab6a1fff2e0c1acd32c2e0881a,2025-04-09T16:07:09.130000
@ -285198,7 +285203,7 @@ CVE-2025-21502,0,0,e609b91a197717b73d4133c8279c7e31d49feb54f8e96c78fcec879f0eb13
CVE-2025-21503,0,0,c6621e1804e534da4b6f8af2b5c1b59b3c1bcd12c30ae31ad8d5fe188bdf3555,2025-04-09T16:04:21.040000
CVE-2025-21504,0,0,bc881ca1fb7f096c2e016f923823b9a2470f1d2c468ee6287a81011b2db7263e,2025-04-09T16:02:55.010000
CVE-2025-21505,0,0,f82b99d26e4784c08ee442698027f2b08d7f4b7e9565daea0fd24615c17f7a08,2025-04-09T16:03:07.740000
CVE-2025-21506,0,1,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000
CVE-2025-21506,0,0,adebf56e0e227afc1f43553e52c0b21e84ee510be6541592b62fc2fe7f7bc436,2025-06-23T15:21:39.560000
CVE-2025-21507,0,0,007166eda0d37ec06452a45526793243e0fea8d62f479e18176e81c46b4337a3,2025-03-17T19:46:46.897000
CVE-2025-21508,0,0,38aa46d6a476bca3579602fdfbd94ba2a9ddd3791de5357a8b647e31a8958f44,2025-03-17T19:47:09.393000
CVE-2025-21509,0,0,78d11a80a54a729b734634d90323f7ce96e2b4cd9da9222a33edddf0250cb60d,2025-03-17T19:47:23.373000
@ -285209,7 +285214,7 @@ CVE-2025-21512,0,0,b41dd68018c5ee645b589d1dc835b8f1b44209721493f0312f1786c09fc84
CVE-2025-21513,0,0,3c86989aabb2a1abf9d935de5a183eb43828fa543d6b90f0a3a11729ad9dd767,2025-03-17T19:48:23.063000
CVE-2025-21514,0,0,8f6143affc9f22c6886521c601abb0dc1d9ae0e636d6e6c6cd0ae89c6968aca6,2025-03-17T19:48:36.210000
CVE-2025-21515,0,0,0828af27bcb9a16663a74195e55950d31ee556d7231c37d2d3137b27845ad264,2025-03-17T19:48:55.423000
CVE-2025-21516,0,1,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000
CVE-2025-21516,0,0,33ebc4dc0386e8d08244adab75f9c46c30265c9b80e06b800dd67372899c2fd3,2025-06-23T15:22:04.620000
CVE-2025-21517,0,0,1086512bfae7e253f269aad4651607ad2b61c185f2d23e04b49b9b890b2708ec,2025-03-17T19:49:06.110000
CVE-2025-21518,0,0,a3e730d8002ec29d3429831f974c1c6d7cfb47e29e96c89f068326fa8430be91,2025-04-09T16:03:17.900000
CVE-2025-21519,0,0,bd99e2535abab66a9b94434ac3f5b4c912dacdf6748e95a236c4dafd8868bf6e,2025-04-09T16:03:28.280000
@ -285228,24 +285233,24 @@ CVE-2025-2153,0,0,d1001c611eef70eb71a49d9fe459204d662bb89375cad643af202eb312828d
CVE-2025-21530,0,0,b1a49e867472ba70a25f247af19b090d67ec55139a19152ce999713a4e79ac88,2025-05-07T20:05:11.573000
CVE-2025-21531,0,0,5030ca0040f9a6018a6680d6e91134a4e5feb19b3e27dd86ec8b9c39f5a0e810,2025-04-08T20:53:44.180000
CVE-2025-21532,0,0,ff62206288e1ce3e2eb346cc4f07db2099e0d4a0af5b22a41c25d9e7ed7c5c99,2025-03-18T20:15:25.563000
CVE-2025-21533,0,1,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000
CVE-2025-21533,0,0,ccc0ae1be4f14dabe743caaa8d158db841e2bd795ccdbb12a087598b5bb9f713,2025-06-23T15:22:21.003000
CVE-2025-21534,0,0,f3e3bc44268f89c76af0200cd6217f2c6a3ac2379b1fb591b60edf404fd4115d,2025-04-08T20:53:53.383000
CVE-2025-21535,0,1,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000
CVE-2025-21535,0,0,2e888af15392fb0b9595cc35128d6e3917c29fbaebeeb37721f707b3357f1c50,2025-06-23T15:22:32.057000
CVE-2025-21536,0,0,b28639c212dac5fe3456f26bb9716d382e07a02dd29aec1a2f95f12a92391861,2025-04-08T20:53:58.330000
CVE-2025-21537,0,0,f58f33954af15f700374ba4be972c7b059d34eb3fd460d41885ca0b87c9ecb94,2025-06-20T16:45:43.840000
CVE-2025-21538,0,0,58939685b83171a2f0dbdefd4b15f8bbe50eb2d247ec0557417661152fcf2ef7,2025-03-17T19:49:44.330000
CVE-2025-21539,0,0,8342d82994d74679b4efe1a9e7012563d4b762f0ca4e1d7f1da81ff6370349e2,2025-06-20T16:56:56.333000
CVE-2025-21540,0,0,5c0fc7a5663922f24325b74a7fb831d5b624b90b2a1de956bce68058ecbf8e1e,2025-04-08T20:12:26.263000
CVE-2025-21541,0,1,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000
CVE-2025-21541,0,0,185c0488e9eaeb6b52951ef7b7b65f12c76a0d30ac37b055ad79336ba291a8e5,2025-06-23T15:23:31.587000
CVE-2025-21542,0,0,3a52bdb4139f482b37a35bf074f2329800b6e986f65ea89f862e8d92838cda61,2025-06-20T16:57:56.907000
CVE-2025-21543,0,0,1e4da3260b0f2a0de189ddd7aeb40c7f66c75cf9aa4d7a2bd7414442b02ba8a3,2025-04-08T20:13:35.230000
CVE-2025-21544,0,0,8e6235c2828cdd2783c06437e71f4dae7aa335264d892f772c25be6f01aabde7,2025-06-20T16:58:04.887000
CVE-2025-21545,0,0,8e72a18fadb3251721734a26ad9eb23dfd0f940d095f541002bdc57daf18ec8e,2025-05-07T20:04:23.117000
CVE-2025-21546,0,0,b82f3e380622b9a05860422ffd272d7a27cd1f165e5094c53eda87f473ce924a,2025-04-08T20:14:45.287000
CVE-2025-21547,0,1,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000
CVE-2025-21547,0,0,25a10b0b4a18b05878e66ee2bab4bd3d60b8f9ebc2f40021a4607eff19bde8f3,2025-06-23T15:24:44.480000
CVE-2025-21548,0,0,606a21c57ea081be937bfbc67e5b25b8530acf17f17fc0109687613859fc2d3d,2025-06-18T19:24:16.277000
CVE-2025-21549,0,1,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000
CVE-2025-21550,0,1,92017aa77ae6c95a423070eda1c8df32559a69c0bcdda4df962784b46c563c81,2025-06-23T15:25:05.683000
CVE-2025-21549,0,0,5382d09d836faef06b93d03399d3ac89a276e72c7a12f28c455743ae66c106a0,2025-06-23T15:24:53.057000
CVE-2025-21550,0,1,f923d248ff899007602102b6ca7e933a44ea28f7e5ba26f26c6f5b73ed8e5a32,2025-03-13T15:15:51.980000
CVE-2025-21551,0,0,b673da22cf5f8a5606180b66209828b12e63cef230313032db77a47e1a7f3e59,2025-05-07T20:04:11.897000
CVE-2025-21552,0,0,7ecce434a919c478959a0e1087c69e67e36ea612972e1b51c4e646beee5c29e9,2025-03-13T15:15:52.237000
CVE-2025-21553,0,0,92802bf9739837fa0d2c62514ebaef4b18196a11ad6b61143f1fb0c046ffa5cc,2025-02-04T16:15:41.797000
@ -285417,7 +285422,7 @@ CVE-2025-21706,0,0,f3378bca6611e287e62df39933cf1d21e33557d4d00ba79e50a89e8e61499
CVE-2025-21707,0,0,b9a0ead8603132ae8c9b4545a9ad4ef804e9617616abc14068f03d0615379a18,2025-03-13T13:15:49.053000
CVE-2025-21708,0,0,180375921d7ace222b11f8ec59581e85e27778345c37b4ab9b4b71ce18a0a587,2025-03-13T13:15:49.207000
CVE-2025-21709,0,0,a14e7b079991c2dff834a4c134806b146fad3426c8ee00bb7e36d413c6c5e076,2025-02-27T02:15:14.560000
CVE-2025-2171,1,1,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000
CVE-2025-2171,0,0,f23b527784d8281229ba754f7aa717363b2f886636e19b1f132370bc3f4051e3,2025-06-23T14:15:26.437000
CVE-2025-21710,0,0,7d577fdeeae7df2e8f9e47f3e4aa9e890b8b043c8f557f4e9316ece7be82aa42,2025-02-27T02:15:14.657000
CVE-2025-21711,0,0,e6c14c8d6127b841cd40a6c73bdb0db683cc2793b219532fa0c9bbe5155e4a77,2025-03-13T13:15:49.343000
CVE-2025-21712,0,0,2be8d4a727b7dc56525c5bbe0eccd2de67a0d51ec13edf6e62a85504ec440f98,2025-03-07T18:15:47.507000
@ -285428,7 +285433,7 @@ CVE-2025-21716,0,0,549d7591deeaa155c202289561e5593a5a85c8ded4d1431847a10528b2e8e
CVE-2025-21717,0,0,75c35fa7fba42e24f73abff9b53b1952419e1ddad8d4143bf10c80475ee6ece3,2025-02-27T02:15:15.373000
CVE-2025-21718,0,0,2520ef1afcdc46478f313a5a92354d6fb20effaff260f2b5b7d82b998895b4eb,2025-03-13T13:15:49.760000
CVE-2025-21719,0,0,f615c6b22a70cd4a20e7b0424d01a8a7ad6c045d5c2c11aca0dcb25e7b3a77c2,2025-03-13T13:15:49.913000
CVE-2025-2172,1,1,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000
CVE-2025-2172,0,0,cfe0605f5d917c9f00eafe58994390efee3ce4e1d7d40aca3bbaf19f356b2caf,2025-06-23T14:15:26.607000
CVE-2025-21720,0,0,0a0c8dead69b88fdb48e05feff8e64e2e34f9199f277d44d9b715abac576f042,2025-02-27T02:15:15.683000
CVE-2025-21721,0,0,cb718b259efff33aef42e06dc10e923ca6afb1c706aa2b3e33501228c041fbd6,2025-03-13T13:15:50.060000
CVE-2025-21722,0,0,072d53056ce905d076e5c84d30643f7bbfa8ee92227d7718c69ee109f330f3e1,2025-03-24T18:27:47.437000
@ -286698,7 +286703,7 @@ CVE-2025-23118,0,0,1b6935e1de98bd988462eba8eda54cef63b56f3eba9236fce4c76fcc1a2a8
CVE-2025-23119,0,0,03b50e07e15abdb790cc32062bbf922a7a5b86dedcc5d4ac846195c74e91324e,2025-03-04T20:15:38.060000
CVE-2025-2312,0,0,9414b11cccd912a93c7b77b8b8a4cccf6c204bd0063ade57fb6afec180d8cd63,2025-03-27T16:45:46.410000
CVE-2025-23120,0,0,fcc412fa6fb516a26fbcce2f3fd613ece130eab1dda24987978f45ecc9becda2,2025-04-02T16:01:20.857000
CVE-2025-23121,0,0,c86b05491865e4836bf6329c1e162cbd30a6a1a5c9be4521f81e5cc797e8b1c6,2025-06-19T00:15:21.260000
CVE-2025-23121,0,1,5a5c46c9dbf65791f2e2637d8b8bf18cc2e8a78929cdf524a4840e0ea5e49210,2025-06-19T00:15:21.260000
CVE-2025-23122,0,0,f8c01c8ef5b6f9e831cc1568dda7fdd2cbff2f2dc9b80c6b770cbbbb7df7e604,2025-05-20T22:15:18.907000
CVE-2025-23123,0,0,d28e8b5e29fa7054d5082b2ec0990e478426188aacd81179d6ef03e17b2813d9,2025-05-19T14:15:22.560000
CVE-2025-23124,0,0,4a6299a78e71ef66b973ec2da68c573755c2e809b823d245784536d2b11ad68d,2025-01-11T15:15:08.930000
@ -286746,13 +286751,13 @@ CVE-2025-23164,0,0,d6c71aadf409109dde414ece9e46d71250f8539b53bfd49135d9534a66c81
CVE-2025-23165,0,0,a3f5779be4e59c9a66a594d6c3ca801baf089a9d49144b143211178cc604b18d,2025-05-19T14:15:22.683000
CVE-2025-23166,0,0,47816fc5591e3a4414111fd69de9efb4cbf6aca82919721dea5adc3261322e9d,2025-05-19T15:15:23.310000
CVE-2025-23167,0,0,51e20beaaef964a23d54b2f922e381e06cac714eb024305c1bced81671d165c1,2025-05-19T16:15:27.317000
CVE-2025-23168,0,0,546ed7c64bc03ea0d51fecc396d56c188ec7f68a49c7ea532db1eaf3e684366b,2025-06-19T00:15:21.377000
CVE-2025-23169,0,0,e6f8ba47a6606d785ba012a980755371860a8b07baaaed5333bdd4dff9994ab6,2025-06-19T00:15:21.497000
CVE-2025-23168,0,1,8a7994089ec6385e522516bf2f536510085098ab8ffd833145f9cf8895224005,2025-06-19T00:15:21.377000
CVE-2025-23169,0,1,fec4996f1a4a5562a715d0fac570ff9108e7ca433422b014e4068e2ec0bb358e,2025-06-19T00:15:21.497000
CVE-2025-2317,0,0,9ea9ba34615d5bc5ee8806158627db355af143699ea415828af46066a4160dd0,2025-04-07T14:18:15.560000
CVE-2025-23170,0,0,435072620bb9f6e2323acf1b32f92f05d9f6176513f869147cabcbc7416369e7,2025-06-19T00:15:21.620000
CVE-2025-23171,0,0,93cd0060572ed22af88863bbc002e2eae1bda0f6be8c43e073a24b943a764b61,2025-06-19T00:15:21.743000
CVE-2025-23172,0,0,08d066df5e2545e2c4980c7a00113f81e9955fbf9898af9917452768c0c042ca,2025-06-19T00:15:21.857000
CVE-2025-23173,0,0,46be7eeb11c19f13fd500aa3ff85203ba69130d74a0bd93b54ea0e84e022ac91,2025-06-19T00:15:21.977000
CVE-2025-23170,0,1,5b808da9b57d389379b1d0b1e0c53a07e1a17dd583bc4fe3eec454f691bb1345,2025-06-19T00:15:21.620000
CVE-2025-23171,0,1,827b4248ccfe906d0f0742fd36a2ec1d16326b94ab077d1643894fcbe8936e6f,2025-06-19T00:15:21.743000
CVE-2025-23172,0,1,8349294cda657892d33b9abaf6d3ea4aced4f1702b45ccbb9e881839ea2cafeb,2025-06-19T00:15:21.857000
CVE-2025-23173,0,1,16e7e25ef7bfb6bb9349e599be7048658e67402e487b05b79cbdf70ddf5e83e2,2025-06-19T00:15:21.977000
CVE-2025-23174,0,0,50322119595bff087a12ed6f94f87f583ba40060fccb96eb5cf9c3f3476fa552,2025-04-23T14:08:13.383000
CVE-2025-23175,0,0,d32116b600ac178b1ee720078d8acfc21dc4298d12982e92ae53dd00f4271286,2025-04-23T14:08:13.383000
CVE-2025-23176,0,0,4d8a569d7f8b232199b1ed07a8ee3ee2f1c9e25ade11e06e887257dda42b67cb,2025-04-23T14:08:13.383000
@ -287052,7 +287057,7 @@ CVE-2025-23566,0,0,88ff034c0930eb7962346da8f31a94b9eca19a480252f7930366050551ebf
CVE-2025-23567,0,0,a5334e3a1104d1d3b6196126e4f57ba74f8e92384c039079a9ba04e3f6d27982,2025-01-16T20:15:40.090000
CVE-2025-23568,0,0,541d6e4ad43f8dba765299393aac14407144d095e5c8f6fed5ce69f6ad16e1ea,2025-02-14T13:15:44.123000
CVE-2025-23569,0,0,e1a856fd806178c29488dac0d174aee24c02bc663bf84b5b8e41189ca4debaaf,2025-01-16T20:15:40.230000
CVE-2025-2357,0,1,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000
CVE-2025-2357,0,0,3306f690e5868bfd53d607f9011e67bad600c8de0eec40eabfd6792bc7774ed6,2025-06-23T15:11:50.187000
CVE-2025-23570,0,0,c339e33fe57ee43e67044cf27eb7b67a55d9ba70ad791589ea878809139d8a71,2025-03-03T14:15:42.437000
CVE-2025-23571,0,0,3c56bf3d57cf36665f942829237cdd5ae4a799e329add61ae4a156fa2555e187,2025-02-14T13:15:44.330000
CVE-2025-23572,0,0,de6082afe4a128b0f4da24928b9919e3a956306fd340d20a91397a5cf127b9da,2025-01-16T20:15:40.403000
@ -287772,10 +287777,10 @@ CVE-2025-24280,0,0,7e6318ddeec3c45683c18b4a04b0c338f2389b9346d93c786d9c6752b668d
CVE-2025-24281,0,0,76b9011c7783c871ef865a80caf1ae08e485f8d8810428515769f6f44737d638,2025-04-04T18:22:19.983000
CVE-2025-24282,0,0,92059d5a241b5d96ef7593ded7e2abc281079ec5ed3a524fa050c614e5194214,2025-04-04T18:23:23.340000
CVE-2025-24283,0,0,4df1743210499b8e21375ec5fdb7750825951563a76a92a49e54d06df67345b4,2025-04-07T14:07:33.510000
CVE-2025-24286,0,0,65683583000d5529830b20ccff957add7c317eaf54ac1796bbc7a2c77fe87db0,2025-06-19T00:15:22.093000
CVE-2025-24287,0,0,e41d94977fd890910d04b473f5243ba60c7263c3bad06c2e597f78ea0eb5c900,2025-06-19T00:15:22.207000
CVE-2025-24288,0,0,2a83985293da967adc6016271e645505f2b1fe813d876cc179a7cddf121b081a,2025-06-19T00:15:22.323000
CVE-2025-24291,0,0,af1e02cc91c468c4c3b8047dcc990ef7498963d0fe709481ee27332ceda5885a,2025-06-19T00:15:22.437000
CVE-2025-24286,0,1,fd3fb7280d51fd2a71a111f451a2da4d293afb37dc62ff7a2a80c0cdf8ce2ea6,2025-06-19T00:15:22.093000
CVE-2025-24287,0,1,ebc03adaff4ae5856e885bf441e46a17f37f0bac234cc982630d274eb758a579,2025-06-19T00:15:22.207000
CVE-2025-24288,0,1,2fa6148fd47506eeeac6a7638be549b1e9bea9b3b9bfa376f4b50508c21bc50d,2025-06-19T00:15:22.323000
CVE-2025-24291,0,1,7fd5d75bc01388d3c0c3423ad0eb3c07d7af10787121f31e51948e0aba26b8e7,2025-06-19T00:15:22.437000
CVE-2025-24297,0,0,5d4a74f3648dba475a9505a338d2107001df4a92611f1e742f9c3b8bc6fc9e4e,2025-04-16T13:25:37.340000
CVE-2025-24301,0,0,7b7c3fba06b103a537ce7db06429d9d2300d69047940e33831c6830c359206c5,2025-03-04T17:15:48.160000
CVE-2025-24304,0,0,d93e512a7b4aa7125a9d9a3a56f58a274a5675b50a430e59bfee24f84fb92162,2025-04-07T14:17:50.220000
@ -288729,7 +288734,7 @@ CVE-2025-25568,0,0,8bf6eccd897b3aef0c5b736978952194e590be79850ad050dceac1781eef8
CVE-2025-2557,0,0,a42b70c78dcd89b9d3e57fec472337c34078e8807b7744b63a4210d869265076,2025-03-20T19:15:38.220000
CVE-2025-25570,0,0,a1a60fff83d4e58f97f6cb73bc995dd008cce7cbdda97b57369c1d11bafc9be9,2025-02-28T22:15:39.630000
CVE-2025-25579,0,0,9ad1112c1ed3d836da183b36b2d4375f4736b0d6d1110b2bc10e441acd9590d4,2025-04-07T14:23:36.660000
CVE-2025-2558,0,1,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000
CVE-2025-2558,0,0,0fecb874eee93db88d1c6609beca7f0ff289247f5b4891178b0b8fecdddabbe8,2025-06-23T15:17:34.443000
CVE-2025-25580,0,0,a7fce7289773d49e23ea5e84e7bf568aff3d97944f32e02e6812a51089903564,2025-06-19T00:18:57.017000
CVE-2025-25582,0,0,fdff5f005418e70695619b15a5365b87844b6870f1b28eb8b42a995086eb8722,2025-04-02T12:27:19.593000
CVE-2025-25585,0,0,98a50572e811d5f13ce801a89eed6933c5c3cc3522affcd97ffbbab7b5092abc,2025-06-19T00:16:52.923000
@ -289953,7 +289958,7 @@ CVE-2025-27525,0,0,a4b246e05aa8e9149e0a9842b4c6807efcd61fab385038ed52473da98c7e4
CVE-2025-27526,0,0,ddc528ca33e807ad7bd5971d3e294beeb24112a05eee8ee501fa1c1a70ff05da,2025-06-03T15:36:56.813000
CVE-2025-27528,0,0,737d925979e07df03f0b19543dbdef55dc6a203923452f1c2a733ea2711ffa92,2025-06-03T15:36:47.120000
CVE-2025-2753,0,0,e912daa6c2718d8ed3f24e43ec3e9ee9f4a48455fb53e9e67461e5144c99f550,2025-03-27T16:45:46.410000
CVE-2025-27531,0,1,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000
CVE-2025-27531,0,0,38b70a8ba5bd87d9d2ad404b393001e5890066ca51a211623411c9449671990a,2025-06-23T14:24:00.320000
CVE-2025-27532,0,0,651aa4a409c4869b141a04074791dba5e586b669772ff0617df8a664fec2b98e,2025-05-02T13:53:40.163000
CVE-2025-27533,0,0,b646a1fe0a6d11554ef785ea8ecefbb2ab2f1a88b51b3c456731090eb57b5f27,2025-05-07T14:13:20.483000
CVE-2025-27534,0,0,e40558e45672ac9b9a33735fa16ef08f02dcb0996c9978ce0ed6bcd8b32d3dcd,2025-04-07T14:17:50.220000
@ -290370,7 +290375,7 @@ CVE-2025-28380,0,0,c812077873aafe4be08d39ece96a4d97cd2f4df4a28357fdf5933a2f28611
CVE-2025-28381,0,0,c29a1bab5aea9357924456ab747be9f25188b616f7afcf694fba4f682f8e5550,2025-06-17T19:09:45.910000
CVE-2025-28382,0,0,b0e7ccf5d5a7ced7868f423fbff9e70580d3563f85b9762b991c87477aaa0c67,2025-06-17T19:29:21.273000
CVE-2025-28384,0,0,040afa29fdc376ec47fa008bae4239a0570cc89b0355eff5bcb56a6a3b73be48,2025-06-17T19:31:52.810000
CVE-2025-28386,0,1,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000
CVE-2025-28386,0,0,5912fa67d9596f8f2697095a3fe341321328dfdc001cf398bf53bee4f44bb6ed,2025-06-23T14:06:04.657000
CVE-2025-28388,0,0,1794bcba8ec3946381f378038b8ba673ba619f4324eae27560582f6f3438e967,2025-06-17T19:41:40.320000
CVE-2025-28389,0,0,ac3d6d4614830ae5beed2b1a1a239f742425bde3a69256016d024e0949604b02,2025-06-17T19:42:06.507000
CVE-2025-2839,0,0,b5f50833ae89a723232ee09a371d928add8cd2f82f45ae4596cf5961719812f4,2025-04-23T14:08:13.383000
@ -293402,7 +293407,7 @@ CVE-2025-32870,0,0,9dfaf4968559e46a3335f01151ff3a08e8a477d9c61bda01559d6ee35cfa4
CVE-2025-32871,0,0,0858782c82e95a39be97e7ffdc176ada44bec9377cc23b99d288083a9a1b85e3,2025-04-17T20:21:48.243000
CVE-2025-32872,0,0,a6acd2c4749d25af3a9674e470b92f66756a824f6626eef20d9bf26ef8cf4544,2025-04-17T20:21:48.243000
CVE-2025-32873,0,0,f7d763f6cf9dd2dd2fc4fd446f09dcd8aecf88b16e7b9cbc3c04e6b52caefba3,2025-06-17T19:44:20.957000
CVE-2025-32875,0,1,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000
CVE-2025-32875,0,0,1ecf4ecb9c8c9299160a8dec13b31f1e344f77f02ee93af1c8f61f5fcd4dd794,2025-06-23T15:15:27.400000
CVE-2025-32876,0,0,b359294b619c26c8351a299d7818957dd391eeaf6565d3672638043e8443c0e5,2025-06-20T14:15:27.877000
CVE-2025-32877,0,0,dd219aeeb9989d4c29173d23498e70d0a6a03ae3090a8b9918df11e455e331f0,2025-06-20T14:15:28.250000
CVE-2025-32878,0,0,3879fa1faf01e446cb6e900199955a950befa6933404b3f997c1c9e54a599695,2025-06-20T15:15:20.257000
@ -294858,7 +294863,7 @@ CVE-2025-4037,0,0,c2a9a7365cb7350487e335b4185abf1b7136e28443b7d38831abbd5f1a9ddf
CVE-2025-4038,0,0,811046a13e982bc58a873e9f3dcdd8f0924b9962b393b0dcd42ae969573255a9,2025-05-10T00:54:58.380000
CVE-2025-4039,0,0,82997abe4f3d1a06f2c0c0c7affe39718ef0820c54c5fc54b87a7722e7f87a51,2025-04-29T21:08:47.950000
CVE-2025-4041,0,0,81f238f672f184f46ddf27c78435ddee43bf5343b5983877b97d104b8691f898,2025-05-07T14:13:20.483000
CVE-2025-4043,0,1,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000
CVE-2025-4043,0,0,96e5d1ee8417eb83850d485f2ac507c3e7a120681669505409fb2466342ff662,2025-06-23T15:02:15.940000
CVE-2025-4047,0,0,697dde15b783c10558b99d9c3867d89fa2dd1910aca7332b9ebaf25195362a97,2025-06-04T14:54:33.783000
CVE-2025-4050,0,0,ccfe15f2834569ec41cc4a482172c37e9ee278c6a1d3b20eba7b56bd00075454,2025-05-28T20:08:51.557000
CVE-2025-4051,0,0,ff804ba52545392d7d95b067994000fe8637ebe480f1a272e743d510a5634584,2025-05-28T20:08:14.553000
@ -295036,7 +295041,7 @@ CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36
CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000
CVE-2025-4133,0,0,62707a46d404303184816916a5f626e6709dc33fc51eeac3cd7609c2da4dc930,2025-06-09T20:13:53.007000
CVE-2025-4134,0,0,fe02b000815c2b18022230e610523ae527b21156d0dce332dccab36a3788f863,2025-05-28T15:01:30.720000
CVE-2025-4135,0,1,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000
CVE-2025-4135,0,0,c9ff5c59ba5a97583f7b69e4b2ed2e557c817f63927999bfb3854e6ee5f62bd3,2025-06-23T15:13:00.287000
CVE-2025-4136,0,0,b8475b2b882f1f1345ee88b0d17b9c4d6134110c252d26b338548acd634728a6,2025-05-02T13:53:40.163000
CVE-2025-41360,0,0,0c58d2152e0e379d53112ddcbb05190aaed26ee5677fca051411e5049c547888,2025-06-06T14:06:58.193000
CVE-2025-41361,0,0,bd83711ed5d2ea941a053d38aae602c59aadd1434b92514650a1e422cecff8e3,2025-06-06T14:06:58.193000
@ -295053,7 +295058,7 @@ CVE-2025-4138,0,0,e24a1df01d5dbf416d0772fbc42743a05ce6be9e23d5dee2edf9f865e78913
CVE-2025-41380,0,0,6a50932054dc502ee7c0d77cfea4430344ce4717310545d50ac9fc3a7b76dc81,2025-05-23T15:54:42.643000
CVE-2025-41385,0,0,37545ea39efd4d7b5e0d6cb5131cca3e61d7d577b10fafacb6827a6e97f74309,2025-06-04T19:58:38.140000
CVE-2025-41388,0,0,cea4fd6e5baa020179de0c3ab4a93002a86c5b4be86c160109165aee67a76dd3,2025-06-18T13:47:10.020000
CVE-2025-4139,0,1,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000
CVE-2025-4139,0,0,1495c73b6647ed5780d6e1ad25afe1ee98c197ea2b5ab75677590ec2918b1247,2025-06-23T15:13:27.283000
CVE-2025-41393,0,0,530f65a313720270b05a5e04ea761ed2dfbc169adb957fa6f54beb0e36c6dbe7,2025-05-12T17:32:32.760000
CVE-2025-41395,0,0,65b9e3526569f587eb1cd97410ac7325e217f46717fe2bbf0abfe0a9511ead3c,2025-04-29T13:52:47.470000
CVE-2025-41399,0,0,7a1373417457a02ea13a0bd88541383fb57eb0536c4c4f5c68760eae861e0e0e,2025-05-08T14:39:09.683000
@ -295462,7 +295467,7 @@ CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
CVE-2025-43946,0,0,30b1b66631e81e9cea6f13a15d14a3693a662f0512102eed75d0a09582b31af1,2025-04-25T15:15:40.050000
CVE-2025-43947,0,0,45dc55ef8d0feb1382386c26465395b874bd89f0f1e3ab24423e3a96653b3c87,2025-04-23T14:08:13.383000
CVE-2025-43947,0,1,ae1d3f46580c150253bdd8592038a95b81141e936f71e9dab7b936d6192f4447,2025-04-23T14:08:13.383000
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
CVE-2025-43949,0,0,c8d8666427b910512729fd59d7334c67c298b545b1a137043425731a8a0336b5,2025-04-23T14:15:29.783000
CVE-2025-43950,0,0,fd407a24e88ae012aca24316990e11ac16eda1715cfed08e301689999509229f,2025-04-23T14:15:29.930000
@ -295658,8 +295663,8 @@ CVE-2025-4498,0,0,fe4e54354871751f165270510115e7eb077cabbe51e36c7351729c7c48e0bb
CVE-2025-4499,0,0,1c02b1692a3925b37458edec07dd6f80534dbff3f2fbf04106606bb95639a5b2,2025-05-28T19:24:12.107000
CVE-2025-44998,0,0,f1cb20085e6ad15afab179cb443903adcddb0c447c4e2857ef8052b5a5ee7d7a,2025-05-28T14:58:52.920000
CVE-2025-4500,0,0,b252739c7e43e1ed91691824353b7e97e2316b3cdd7ea7ee228d50eda984af82,2025-05-16T14:16:47.373000
CVE-2025-45001,0,1,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000
CVE-2025-45002,0,1,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000
CVE-2025-45001,0,0,5f4f05269038efb99ff482c55824e423af834b14d21d110122e4124de52aafd2,2025-06-23T14:18:43.410000
CVE-2025-45002,0,0,4062797d30f697271410ee1f345875504aece31b398023f8c0ae9a198b60b968,2025-06-23T14:15:58.093000
CVE-2025-45007,0,0,5a942b67af458dcbffcc204143a4774311c59d5ad4885c5c55fb7d9c1ebbeebe,2025-05-09T13:45:28.627000
CVE-2025-45009,0,0,36c5cbb0f37a55a2bcef11b942052fc47923af5c699055a488196b4ed54c3a22,2025-05-09T13:45:16.187000
CVE-2025-4501,0,0,2714d56986429b577c90c5115348855d531ee85270c1ad90311b312266b13026,2025-05-28T19:25:52.347000
@ -295775,6 +295780,7 @@ CVE-2025-45616,0,0,c9bb8d066376074c78acbc5924019c8e92d0a353068f59914673e5a7f7d2c
CVE-2025-45617,0,0,45ec32c91fa8777f902c441e0ad6a5cbb4b231cb8d61355ddcbbf662a9985843,2025-05-06T04:16:18.073000
CVE-2025-45618,0,0,767ee00e764e7ef5bf5da280443f8f8ac155a067bd61e2227396cf4720a51137,2025-05-06T04:16:18.347000
CVE-2025-4562,0,0,d2657f9e359abe15e16bbecb49ae9ba4428138285e1222df0d7e8c7358260e0e,2025-05-22T23:15:19.620000
CVE-2025-4563,1,1,02cd410129339d703842fe711979ad9145a12e58a5b9c9800dfb713f1cab80ce,2025-06-23T16:15:27.350000
CVE-2025-4564,0,0,8d3f9720d908e446b737db8b900434db81b180dd53397ac7362129a7e91e5314,2025-05-16T14:43:26.160000
CVE-2025-4565,0,0,4256f50161ec95000de287e54ecfa2b8b56d3a683613b559af85e1b918e03fef,2025-06-17T20:50:23.507000
CVE-2025-45661,0,0,d4f42c25435e84688f4ce3b76e88805fd211efabda5b2495d0e5c2dcb924ab9f,2025-06-18T15:15:26.513000
@ -295819,7 +295825,7 @@ CVE-2025-45846,0,0,51d693d14f22c6c735df1fa76b25052e8a11d20981dbbc646066d2d29016b
CVE-2025-45847,0,0,4ed18ef753848179b985042a19837700c8f0cb1a81c7d5ce45292d9f94eadadb,2025-06-02T17:27:39.587000
CVE-2025-4585,0,0,de0ef46eb68a7bfcdbe12487f0dad42760c4b1425908d33a0156dee60d09c3e8,2025-06-16T12:32:18.840000
CVE-2025-45854,0,0,8da6ea0519a831e65c7cd6df3945ca62dff794f0b2efeba768b2f0909531788a,2025-06-09T15:14:23.153000
CVE-2025-45855,0,1,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000
CVE-2025-45855,0,0,f83acc46039ebb0726b90a3363a04a3275d7490e0c2ce1bd0670de0c97f6346c,2025-06-23T14:25:39.560000
CVE-2025-45857,0,0,dcf851c628b00f7cbf7f9997f2bbb8d1869ef466c2968b3bd76ff4947bdcf23b,2025-05-14T14:15:29.737000
CVE-2025-45858,0,0,a000c9c9a64c590fb591b967028ca45d12f9b4512bdd2b8ce0395e50725e9c2d,2025-05-23T18:57:36.203000
CVE-2025-45859,0,0,f04cb01d4c73926dbf1b974b33e3c12f183dcea4c8d1314caf69fec8d88d36b8,2025-06-16T18:25:52.807000
@ -295869,9 +295875,9 @@ CVE-2025-46060,0,0,2da92ad7624a864b48c567a8180993e9f22aabb3ca09b58c16a9f521dba58
CVE-2025-4607,0,0,7929f7497a2f3fdbdefa5c40c24e8dfb722bcbca57929b42733b89c15e0bc1dd,2025-06-02T17:32:17.397000
CVE-2025-46078,0,0,2fc8a269b5a28c0015e225ca3c3d8f64c503abc0c5a8ea5ce240137e0c4c6776,2025-06-04T19:59:09.353000
CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112a43,2025-06-04T19:59:02.890000
CVE-2025-46096,0,1,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000
CVE-2025-46101,1,1,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000
CVE-2025-46101,0,0,3ed9f973817c1345c2cb40bfea3c49153c9652185515117023d05d2c6e6b815d,2025-06-23T15:15:27.793000
CVE-2025-46109,0,0,bb1109471e63f9f01bda5a8e1fe3323745e7e35c57fe91f6f8526660daab841f,2025-06-18T16:15:27.607000
CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000
CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000
@ -296217,7 +296223,7 @@ CVE-2025-46718,0,0,885c34e4ac34f705a4ef1825ec33431373f2ba5032bb9657c9e7312381094
CVE-2025-46719,0,0,b25887997950d7d3ab39998b5b94bb3c024854b8ada00a78d9ecb1ca2e7fd509,2025-06-17T20:18:16.003000
CVE-2025-4672,0,0,770c887d10dfc09d1e63fabe3c5364c54cf353a1948a47be8491ff905549003b,2025-06-02T17:32:17.397000
CVE-2025-46720,0,0,4c7236595d2f87b0b5d063c4e69a2cbdebfbdb7c2550f3a068081936f8a24e34,2025-05-05T20:54:19.760000
CVE-2025-46721,0,1,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000
CVE-2025-46721,0,0,128da113ea8f0dd50abb34a02b6e5908442d1b77af5bac7d0b34ba51b6fb6537,2025-06-23T14:55:07.967000
CVE-2025-46722,0,0,cf46ef2e6249b8935c48334672e28d50cf3343c6c1aff5e7300e5238080dc235,2025-05-30T16:31:03.107000
CVE-2025-46723,0,0,23909492a9ee443fd9ae3060d2ebc8db94328dcc9cf17248e4a0a9a7d6a6e953,2025-05-05T20:54:19.760000
CVE-2025-46724,0,0,e9c56e50a6ab4789521e42f1b57dca0731674d1f66af8a8445523cd7498bdd5d,2025-06-17T14:11:48.377000
@ -296596,7 +296602,7 @@ CVE-2025-47256,0,0,c5f61341ce1b30960f41faf1ef0c8059c16b1b83f0508df1bf27b84fa8e3d
CVE-2025-4726,0,0,984a3badb3ae6972f992c3a68c560c7dfd9d5fe06debdb311c424144763624af,2025-05-27T19:51:34.753000
CVE-2025-47268,0,0,4a46b9885e97102b8415ee3e4814f6839dc4a606dc76c0dedcf7a1f41c27c030,2025-06-13T18:21:42.427000
CVE-2025-47269,0,0,b9d52d64e2c0cec1ecdcd2f4d7408887dda629b4e369e1e7b2409608db43df35,2025-05-12T17:32:32.760000
CVE-2025-4727,0,1,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000
CVE-2025-4727,0,0,8969a844acb51d1753bc87877879fed95de1d0baf44d432214b9cd44fd598ac5,2025-06-23T15:14:50.350000
CVE-2025-47270,0,0,f7de4b1bbad67df8d0ed8562ed81ad54a4a617d8e905a95b0012c5c493a9cba4,2025-05-12T17:32:32.760000
CVE-2025-47271,0,0,b4dba60dfb0342c7663df3f21e36f0d1e4cac1426ea6dff373e34c92771a1236,2025-05-12T17:32:32.760000
CVE-2025-47272,0,0,1bb2a09d129fd4f2d7c6b93b95b1a828935f3db642060df71fcd1da62c721565,2025-06-02T17:32:17.397000
@ -297034,7 +297040,7 @@ CVE-2025-4790,0,0,1cde53f18939fd245b2e017ab5d61b1aabe2517bc390d40b0830feb8eba632
CVE-2025-47905,0,0,0badab8f2933a29538d7ef66ea7b6761136968565fc3d324c0e27cff6bcc6258,2025-05-29T09:15:26.587000
CVE-2025-4791,0,0,28f506e7fa1c70a3ee261c046fff0149e1890f11d112b4d14f3ee7199740eeee,2025-05-23T13:19:04.810000
CVE-2025-47916,0,0,7254b14db3d84a4fae2a957ff5aae1d18dda4aa5d6c7fa7b707e42e9728ce8d3,2025-06-20T17:42:15.083000
CVE-2025-4792,0,1,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000
CVE-2025-4792,0,0,f4aa37a652381fa243274795ed37a191f51b49c8040e00fb5b01e1520c8c5161,2025-06-23T14:51:36.113000
CVE-2025-47928,0,0,c98d79f9403b054eccd93f148fcf481d13089a9bec154b271a0eadcf13b86566,2025-05-16T14:42:18.700000
CVE-2025-47929,0,0,7fc15c7af26adf36cdf89018fb748ea0cea6a0ed56d6cabffa736dce44604a5c,2025-05-16T14:42:18.700000
CVE-2025-4793,0,0,ec69064861ba117d418880947f64b864bae8e19e90fef5ea47c2be77c9ecb787,2025-05-21T21:00:12.357000
@ -297364,9 +297370,9 @@ CVE-2025-4869,0,0,870b6fb7f96763d1ac0b1ff6f50594749d4dd6426d23a4566486d6e216908d
CVE-2025-48695,0,0,39b88432a15a3b8e91feb94d32e426fa969d9198b6e75ff2ba9bd798bc547242,2025-05-23T15:54:42.643000
CVE-2025-48699,0,0,44d8862507c41a93f498ba4b6a9317982afecdc3e0eb3976f21c5759c7dadf21,2025-06-12T20:15:21.583000
CVE-2025-4870,0,0,b9975f7dc89af7cfd09d0fdbb811b050a9e4120a956157701f81e28626493a8c,2025-05-21T19:40:16.293000
CVE-2025-48700,1,1,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000
CVE-2025-48700,0,0,cee7f1f9d16618ddf8f0ee40193c7dc9b1ca05cb84b07493960a078ada86c35c,2025-06-23T15:15:27.930000
CVE-2025-48701,0,0,35aa8b81bef67a8b475084f139411c80773326ef7d953cb76c543e9e2bb840a9,2025-05-23T15:54:42.643000
CVE-2025-48705,0,1,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000
CVE-2025-48705,0,0,5fbe304565cc6dded9dff7ec2e63dfc17afbc5aeefe04a66fc4003d534d40ed2,2025-06-23T15:15:28.067000
CVE-2025-48706,0,0,b6396ca4f8f26244025ac40c88dabb3a26eff089e363c92cb8bcd03b388139a9,2025-06-20T14:15:29.750000
CVE-2025-48708,0,0,2f2ee7f6835a24101b8f2fad92720fa7e2d2cfee9343296271ef3f76df75e315,2025-06-20T17:13:54.913000
CVE-2025-4871,0,0,d9183a6ea5a2afa28642be53d20b661c6aa8059e9e6e695046b3eafadb08ebe3,2025-06-12T16:27:46.547000
@ -297386,7 +297392,7 @@ CVE-2025-48744,0,0,a039740c56d4e93180f7ac5a496864b9f89957753f0bd173790011a4f09f8
CVE-2025-48745,0,0,f2d9c50f894d95aade77e788c5c232afd36dc9a98ad93323913ad989a9da4a6d,2025-06-02T13:15:21.897000
CVE-2025-48746,0,0,f72c5a8d16806b0ba968ccabf6f8a5266bce1d331d3179a6d466243179f0e088,2025-05-30T17:15:29.937000
CVE-2025-48747,0,0,77f2b3f312e05dae0fd49a4fbf0de33587f3dcda8e8123589893c43a0bb874a3,2025-06-19T00:01:01.873000
CVE-2025-48748,0,1,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000
CVE-2025-48748,0,0,805c8ddf5f6d5cc89225c3c520f65d04d0cefe8e51baabf5c77788a905f60841,2025-06-23T14:37:52.580000
CVE-2025-48749,0,0,1782601449fdbad7e128b503fdc88bf73801639c356e6033cd52a3b78e0cb26f,2025-06-18T23:59:44.600000
CVE-2025-4875,0,0,130bc5da676a7028541a0b0fca1ba41a63baeb979bb88a491f60fd8b45c2548f,2025-05-21T19:39:23.917000
CVE-2025-48751,0,0,7b48afa401b2b93b58deb3a57cdb6356d07d3afa8b095b572a5b480362f21209,2025-05-28T14:58:52.920000
@ -297558,7 +297564,7 @@ CVE-2025-49075,0,0,54be58c89d858cfc2a2a38282ca430d2d44e5da7afee9b9ba3a3af9890aab
CVE-2025-49076,0,0,11ca67faa747268bd3e42ef94a795b585577483e7914ce9d6c222e8b9284807a,2025-06-06T14:06:58.193000
CVE-2025-49077,0,0,ea2e636f032c4f39bdc78ff636e21026e853dcff77025a2be8dc5f87ad787347,2025-06-06T14:06:58.193000
CVE-2025-4908,0,0,de60be5e9644ec87fb1afc243f75b0e5b1a22cdd347bf91d496fa5782bf1af05,2025-05-21T17:25:58.063000
CVE-2025-49080,0,1,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000
CVE-2025-49080,0,0,a3ee145d7be4cf83dc9f312b5f9ff46e81d31b0fafa34aa01f5f4b5126f1b5b8,2025-06-23T14:09:31.560000
CVE-2025-49081,0,0,f46741ebf083f87723e4189da0a46cfa0dc212582189b9cc78f69348a5e0933b,2025-06-17T20:32:38.453000
CVE-2025-4909,0,0,2543aa084bfc859fe1a7a0558cc76c793b6ee9b986cb9885265313fc24749d9b,2025-05-28T13:08:14.173000
CVE-2025-49091,0,0,6801a10a59e1cc04be6899d10437a31277f24115003af5306a3ab76dcd2ff20b,2025-06-18T01:15:28.803000
@ -297987,7 +297993,7 @@ CVE-2025-50048,0,0,51d0791e924069b35e627a01d5c6c3ad560a9ad85e74f0bb2bcf139e9159b
CVE-2025-50049,0,0,726a0dd76d44294314cdc18ad7657fe08bc2f7ebe99df2fd6367d870bcf1cec6,2025-06-20T15:15:31.440000
CVE-2025-50050,0,0,55ed1cfe9ba407ae0f1cef45284cfc220f443df1553027f06d9901c62736ec42,2025-06-20T15:15:31.590000
CVE-2025-50051,0,0,586cfd8fc67c6e705f028bea1f285dc2f199480672abe9b2cbd65d3de69e7c1d,2025-06-20T15:15:31.747000
CVE-2025-50054,0,0,56d928378c753c8a037c09aac14688a6511e72e126eb6212e7ffd9507c69711a,2025-06-20T07:15:26.367000
CVE-2025-50054,0,1,8345803c26053cd2e12f78da8fd6f235094a62d9934b629ba0efa2d7c6076176,2025-06-20T07:15:26.367000
CVE-2025-5006,0,0,681cabb0d000288ea3de1bc96c248c8dc62af67d94cda924b490a24cb5ce4b87,2025-05-28T01:16:17.537000
CVE-2025-5007,0,0,90fd6cc505f919e9193a4f785ead55c22de48a03da4d584106515fa806e84a62,2025-05-21T20:24:58.133000
CVE-2025-5008,0,0,a44de43d4fdee78a58fb0f23f855e641b712c558235d8e8c4b331b29571b8d57,2025-05-28T01:06:49.867000
@ -298024,10 +298030,10 @@ CVE-2025-5032,0,0,4156143fef9ccb288081dade2120fec7f51a54986c4f66b96dc31d6794fced
CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a45,2025-06-20T16:15:38.947000
CVE-2025-5034,0,0,a5237986d670eb1fe5b75c607eb4c19a8e149970963980b2e7a9c1ea2e29eb2a,2025-06-21T06:15:18.363000
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
CVE-2025-5049,0,1,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
CVE-2025-5050,0,1,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
CVE-2025-5051,0,1,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000
CVE-2025-5052,0,1,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
CVE-2025-5051,0,0,5142d535b5dcabf799858265cb0a073c54ecb398a0506990f7cead12fe67b40e,2025-06-23T14:51:29.537000
CVE-2025-5052,0,0,fb14f53f59872f2ab4cd272c068cbf989da6288adaf09d4f876ce8e48ca81915,2025-06-23T14:51:27.970000
CVE-2025-5053,0,0,3d2b70b4aa9309898ac88338d0e45e48032f9ef01b4619e69e4f80270305e3ac,2025-06-10T19:34:33.830000
CVE-2025-5054,0,0,68d095110a6b2be331697a8699cb10ea98d7a65a96add11ba5059f95d872a268,2025-06-02T17:32:17.397000
CVE-2025-5055,0,0,2813a40f904a4d38c72314bdeb0478f12eb76957b4f05117bb45d588d4e24d35,2025-05-28T14:58:52.920000
@ -298045,8 +298051,8 @@ CVE-2025-5068,0,0,743f6f8e9f7972849bbf135b58a69c40f5a6f921a1bb6da952423dea4534ee
CVE-2025-5071,0,0,3b2deef9236f3c759cda3ca3d7c218b19b13648226fc3eecf9f17094b26eaf9e,2025-06-19T10:15:22.027000
CVE-2025-5073,0,0,a1230535d583b5f466b5fe2615cca31afcba55333f600b324f190ec047a41d18,2025-06-05T20:13:49.707000
CVE-2025-5074,0,0,b32e6a163eb96eec8f69e51ca7a85c7da766b8b9d224e7b4f2f300a52a5b9bc3,2025-06-05T20:14:07.020000
CVE-2025-5075,0,1,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000
CVE-2025-5076,0,1,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000
CVE-2025-5075,0,0,84d47ffcc3b0444179dda95ea7f7a9076e7c3fde7adbf4a674f65dac66b933d7,2025-06-23T14:51:26.367000
CVE-2025-5076,0,0,dfb109cca293f4ecfde310307b8461b290498890aab42474abfa1c401ad76c9b,2025-06-23T14:51:24.623000
CVE-2025-5077,0,0,5bb361381f7737ab78bfa864953c20bd9e7bf1942fef8fedd416b02808d591ef,2025-05-28T01:53:25.660000
CVE-2025-5078,0,0,57059c330cb53e9cb302cf773988b3ce2f731665e7a246772389547bf3f9a34e,2025-05-28T01:52:35.277000
CVE-2025-5079,0,0,b65b7a01086680e7c33bb20f87a251322b770baf6a9a37966a216093dc14b5cf,2025-05-28T01:50:48.303000
@ -298065,8 +298071,8 @@ CVE-2025-5106,0,0,8d60356cbd9079f6bf55b49bab02b8750a168dbc792ae017334e677c2dae68
CVE-2025-5107,0,0,9bef18bc6435a934e04f34863d5f7ce6cdc3bf383eb4382c07acbfcfb93c088a,2025-05-27T15:15:35.577000
CVE-2025-5108,0,0,78dbeee09f012ae2aaa551a95acb36d04547bdfe4234231d8b8da6c18969eef6,2025-05-27T15:15:35.727000
CVE-2025-5109,0,0,af8f6823c329a88d09917c36f339b1374b9b939e3d9208c4a4573c3155524a8d,2025-06-20T16:02:35.837000
CVE-2025-5110,0,1,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000
CVE-2025-5111,0,1,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000
CVE-2025-5110,0,0,afef19488b9b1daf7bad30423efa6db081313c1d760a7b2a90aa6560948b5674,2025-06-23T14:51:22.817000
CVE-2025-5111,0,0,17bae438284397cfc73752a9b416f2ba9d466f2efbb72d3931bb65bdff917541,2025-06-23T14:51:20.580000
CVE-2025-5112,0,0,14e5700c63f1f1d448cfb10a35f8ed4225ebfe296cafec9014826190b78b6763,2025-05-23T15:54:42.643000
CVE-2025-5113,0,0,4fded5fd40401c221cac2ef8ce80b61992e5d3143855e1468dca36f7819a9933,2025-06-02T17:32:17.397000
CVE-2025-5114,0,0,20a4205c8646981529f8abb6bcbb5fe0a32214254e6052ddc8802d6fd9b03d3c,2025-05-23T15:54:42.643000
@ -298212,7 +298218,7 @@ CVE-2025-5249,0,0,fc0947e1350e4210bd6e677b41423c19ba4df5864aa9264c3ec9f64636ca0b
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
CVE-2025-5251,0,0,f632fe7c5885617fb201b5b935c30961323c6054755926cad7791588fe5ea46c,2025-06-10T15:12:43.393000
CVE-2025-5252,0,0,befcffbe58a6c748b51a32dbfdb428108ffe2b16ca817a921564fafd634c86b0,2025-06-09T18:51:06.110000
CVE-2025-52542,1,1,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000
CVE-2025-52542,0,0,6a356dbb016e8c78bba3561542110106778fbb5f08761ae704acc7dfbd8bdd74,2025-06-23T14:15:26.753000
CVE-2025-5255,0,0,0d9f56d5e1509a662651a50a1959d77ed1c049a1471df3ec7483fe3801248464,2025-06-20T10:15:21.653000
CVE-2025-52552,0,0,27741305ae00f3d36bb92eb33f15f4f7f40418a880f409aa430ffa00fa775060,2025-06-21T03:15:24.990000
CVE-2025-52556,0,0,839776e8ea5d48efbfe10dd749a9ae7819c361ef6cbb9befd317045b49103746,2025-06-21T02:15:19.947000
@ -298268,11 +298274,11 @@ CVE-2025-5283,0,0,a8169db79b4666d05c59f16c729749cd032f3753a6abd4a1bda7e79d017ef3
CVE-2025-5285,0,0,44bcec87abafcefe0886e878731e41dce32b0fc09d4f84e223174bcbfeb5ce09,2025-06-02T17:32:17.397000
CVE-2025-5286,0,0,05e7ca3386f0ef15ac2b01314d8e06913e02de8c1752e75b99b02bac23121404,2025-05-29T14:29:50.247000
CVE-2025-5287,0,0,b8300f230839e0ad3335fdc92731d9b07abc7f3405256834dd55febc4f9b0133,2025-05-28T15:01:30.720000
CVE-2025-52875,1,1,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000
CVE-2025-52876,1,1,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000
CVE-2025-52877,1,1,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000
CVE-2025-52878,1,1,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000
CVE-2025-52879,1,1,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000
CVE-2025-52875,0,0,de754e4497180a907f0d433e64adca9030b7017b82b3587162d59f6bf510c0b8,2025-06-23T15:15:28.260000
CVE-2025-52876,0,0,df0bcba60153504feaa86afc0059e8a8994fd547fbef45903954ca07a542bbc8,2025-06-23T15:15:28.447000
CVE-2025-52877,0,0,b2da309d35100995e03c52bab09ada2e66fade963cff04b95af0c33c599be141,2025-06-23T15:15:28.603000
CVE-2025-52878,0,0,a631817ec18b37959b9580e1c3089005937ed70e4127c5016da10b9e930f9076,2025-06-23T15:15:28.770000
CVE-2025-52879,0,0,9d4f83893a3c9f1de395e9905a463896db5eb3d4bdaa2a661fcb2a12bdf97553,2025-06-23T15:15:28.933000
CVE-2025-5288,0,0,5b20c7a865ed486d932e1f5165bbcfd30ae2f04bc0acfb20d9396799c2c655a3,2025-06-16T12:32:18.840000
CVE-2025-5289,0,0,b9d742cd07348cf5ac5a6bc32677ea7f81a3f79e8dc609eede8959a563a09a42,2025-06-21T11:15:35.240000
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
@ -298289,12 +298295,13 @@ CVE-2025-52923,0,0,825efd0bf97043c553869930f73d387d618324b6c5d516039439c06bdeeb2
CVE-2025-52926,0,0,a2ea71f5f513826223184ebdf984a9517b3b97a40b47a0432cc67e7fcc0b13bd,2025-06-23T01:15:21.877000
CVE-2025-52935,0,0,69f0a3d1fc334d25c1072a4fb7417df75df937e1592f0e78c34731ed1c3d5dec,2025-06-23T10:15:27.380000
CVE-2025-52936,0,0,5a73b32cd0cf146bc0ee081a574067937ffe0c6a2ffedc2de43fa39d77cb9bb9,2025-06-23T10:15:27.570000
CVE-2025-52937,0,1,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000
CVE-2025-52937,0,0,546c5911371065d8732d43f638a4acee46934556799b9d4d3a79d6c246ce41bb,2025-06-23T14:15:27.203000
CVE-2025-52938,0,0,32cfa0125cbed90894c155e967587051de3d80629a5cbc836d8fa783497c0b5c,2025-06-23T10:15:27.857000
CVE-2025-52939,0,0,acb57ccf8c49d776c9ae1d73e624db6ecf3f28e9fcac64a91b7b96853d88ef7b,2025-06-23T10:15:28.007000
CVE-2025-5295,0,0,d0e6aa3b032b1532910154b10cc32ceaaf64a98256f38c6f6f628cd0a1c4bacc,2025-05-28T15:01:30.720000
CVE-2025-52967,1,1,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000
CVE-2025-52968,1,1,a9658590dac69c266160ede971810619ebd88051cc14c521e59449b331bfcf05,2025-06-23T15:15:29.350000
CVE-2025-52967,0,0,6400c520949bb3b6a2dee7f261f5e193d9f26cdbd6767e30da7f754f88aeefc3,2025-06-23T15:15:29.163000
CVE-2025-52968,0,1,1b929f37b5e64d12a621147b3a595070ab199f341f8983fdb5e0a7be6e7d4b90,2025-06-23T17:15:30.990000
CVE-2025-52969,1,1,546a1519926ec728f2b164af7db7b3a0ef54cc320ae9101eb035308842ea95cb,2025-06-23T17:15:31.137000
CVE-2025-5297,0,0,32219ebb357b11c35687ad82e2d72808a3fe88681e14d78b6d0829c9d1dbc7ef,2025-06-10T19:33:01.990000
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
@ -298310,8 +298317,8 @@ CVE-2025-5325,0,0,c13176172452a62b2dce96df66b8263f391e2e94fbea914673cf01de62808a
CVE-2025-5326,0,0,44e560162f190407a031d43fb109d883b338df688e809a58566da260b71fd2ba,2025-05-30T16:31:03.107000
CVE-2025-5327,0,0,a8b880c32053a31de283f5a9cad582c296c544f77211624787db5b92e0d637e7,2025-06-10T15:13:37.533000
CVE-2025-5328,0,0,69e2dcbfc2b85f6314db4745b576ea63b045f3b89808be8d33ed6e2b70669005,2025-06-10T15:14:10.110000
CVE-2025-5330,0,1,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000
CVE-2025-5331,0,1,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000
CVE-2025-5330,0,0,e7ffe160dd4f6c3817c7e36e2e683e91c9ad47396ef2482f8a3aba919f7252b8,2025-06-23T14:37:01.860000
CVE-2025-5331,0,0,3e528485905d1d35c61ee15111a6c2d55d98c95985d2190c3f8dd98dcd93e3b2,2025-06-23T14:35:13.397000
CVE-2025-5332,0,0,e1def175621c4e1d1942302bd613c0906cf0d988637a95edef4cbf91efd49e74,2025-06-04T15:37:02.583000
CVE-2025-5334,0,0,3b25ffa10fa68a37bf0e18657dc7cc96e971a33e8fade936cdd130170872987d,2025-06-10T19:15:35.243000
CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000
@ -298541,13 +298548,13 @@ CVE-2025-5637,0,0,b4095ae9d6d117e5e5fe317c037877142ad009ffe86dcd38c16540d27f7b17
CVE-2025-5638,0,0,5fa603e90eeb98583ea40591c0f1493256693a05d984ab5725744a9282518d9e,2025-06-06T20:12:17.237000
CVE-2025-5639,0,0,df69c796d2f2dcdd7b52222b3cca34eb33581a84dfcf4149ec44f708e4f12118,2025-06-06T20:12:28.340000
CVE-2025-5640,0,0,a28c86c8136e1feb945fccbeca2e1e5a219c046c15a8a6365d3963b3188e3fa7,2025-06-05T20:12:23.777000
CVE-2025-5641,0,1,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000
CVE-2025-5642,0,1,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000
CVE-2025-5643,0,1,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000
CVE-2025-5644,0,1,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000
CVE-2025-5645,0,1,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000
CVE-2025-5646,0,1,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000
CVE-2025-5647,0,1,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000
CVE-2025-5641,0,0,d5b74ed2999cb0573a6a00c5400b18ea1376fb3a7e88a5275977b2c2932e733f,2025-06-23T14:37:57.193000
CVE-2025-5642,0,0,07bc4ff6bdf6624bf56957684ab53a92c9369b191efa0f5f0ccbb572aed8a52a,2025-06-23T14:38:11.337000
CVE-2025-5643,0,0,bdc7b71238ce4013f922d9b127c18310da265916fde136924493a6a34126de7b,2025-06-23T14:38:25.483000
CVE-2025-5644,0,0,5900d2ca0f624df2ba2cda28d1db8544b5da24767efe33d6c650c6c3f7428c8e,2025-06-23T14:38:45.623000
CVE-2025-5645,0,0,17c50a7d3445db31fbfcc3af059c43697342bb3ec0608c670b1178f5cc8192e1,2025-06-23T14:39:01.727000
CVE-2025-5646,0,0,2af58f3f277256983114103b89acb87ac3e1b53da1079dd51f5194cdb134d619,2025-06-23T14:40:23.430000
CVE-2025-5647,0,0,cec2cc0ef01931a062fe6cfcc4eb1a3addc899b6310cbf327d1ae9d895f9464b,2025-06-23T14:40:09.040000
CVE-2025-5648,0,0,8d8a946a9691d84bd632207adec092a07f5e621bdddce363a223111a1e12ac35,2025-06-17T18:56:04.373000
CVE-2025-5649,0,0,8d1f3267e39f86a1983625a80d2b4086de30c2bb535ef4e2d4852137479dd55a,2025-06-10T15:05:56.120000
CVE-2025-5650,0,0,c41210387d1002531a8860804a9f5e98813d1f3f1969221163975f35d5b4da41,2025-06-10T15:05:23.553000
@ -298710,7 +298717,7 @@ CVE-2025-5871,0,0,cf8b155d3f5676937055fc70fc356be425d106281694dba873cdc0b7b3134e
CVE-2025-5872,0,0,df91dff262321d8e54a907aa2d26c35e2664d50439e57f3d1baa4408ee42b93e,2025-06-09T12:15:47.880000
CVE-2025-5873,0,0,94e40892e1834c35ffd2c63a40f58e3bdf2ff473f557d19637cf12f248462e7f,2025-06-09T12:15:47.880000
CVE-2025-5874,0,0,726c9df65c566725a510f5c58b0c057c9bdfc295fa5f1ff3d2641c2157e02012,2025-06-09T12:15:47.880000
CVE-2025-5875,0,1,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
CVE-2025-5875,0,0,c25b34ccfcd613e0dc066c8ac82a22ec084260cbb2bc3930454841ae31515b22,2025-06-23T14:21:01.890000
CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea88,2025-06-09T13:15:25.777000
CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
@ -298797,7 +298804,7 @@ CVE-2025-6007,0,0,ad7217a46edf88f3122f03c09e2fdcfd31382468cbe1002c4a5de402899399
CVE-2025-6008,0,0,cf45d1b8877307f98a5e962959db4dd8b70df84c99522375a10c3d04cde0826f,2025-06-19T01:26:01.867000
CVE-2025-6009,0,0,78abb2d4f36e6029b865859c44e8b3b2ae426316eb8bf2e15ca3e33565c4ca16,2025-06-19T01:25:17.743000
CVE-2025-6012,0,0,26f2f66d87f45d6aa756cc004552cfa11ed42d44708395d664a6658fe8d21b45,2025-06-16T12:32:18.840000
CVE-2025-6019,0,1,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000
CVE-2025-6019,0,0,4ac3780c7472efb91964dc19bb6ed01f38f9812cdbb0225ce13decc142e609e7,2025-06-23T14:15:27.323000
CVE-2025-6020,0,0,439a2d09f05868a64a6818f204c8af8c3741a1aa91da69dac7da1c6864b5ef72,2025-06-17T20:50:23.507000
CVE-2025-6021,0,0,4d6c316d6b2265feaa5a1f1976caab5acbb233a1583e3791720a0a82dcf439c4,2025-06-12T16:06:20.180000
CVE-2025-6029,0,0,e9108be7e98d0780991a9dbc9771d79381463de686ea76ad25b1212ca465841e,2025-06-16T12:32:18.840000
@ -298992,54 +298999,54 @@ CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b
CVE-2025-6347,0,0,76734206bdc523737368eb0b5491079d98ed161c921feac5e394265e2bbfb26b,2025-06-20T16:15:30.057000
CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
CVE-2025-6352,0,0,62dcc2d0d677be1f0bf6457d6b220cb963fe1d46556db17bc4c47d1d8c8d8385,2025-06-20T16:15:30.430000
CVE-2025-6353,0,0,59d8b8297840f89c40ef36cdd69b9e5d760b77a0f415fde65797366096e36de0,2025-06-20T17:15:41.737000
CVE-2025-6354,0,0,e5ff5359021ef92c7c075fbef4ee6410047d4c341520f408b4431aef1608a6a6,2025-06-20T17:15:41.977000
CVE-2025-6355,0,0,9e75b08ef9e6d0811eec887a3b5a5f4bd2fd3b5be1479bcfaeb0db5aa9d2e49b,2025-06-20T17:15:42.217000
CVE-2025-6356,0,0,8906897f1b5089a2863720fd249aa4f385343dd922b3be13810cd907806bfc51,2025-06-20T18:15:29.280000
CVE-2025-6353,0,1,bcedf07597810e9d313a4c3a7c18928e1fe4e3b892c9aeb0160c86103a73a43f,2025-06-23T16:15:28.043000
CVE-2025-6354,0,1,df2134d7cd28fa0b4ed4b2c0d2a5b7ad474049f7ae16993180dd54340ff08c00,2025-06-23T16:15:28.183000
CVE-2025-6355,0,1,ed61aa51361a6ef5314447f6138259759f329568a14df6f763349dcac107378e,2025-06-23T16:15:28.320000
CVE-2025-6356,0,1,6f51e45f250dd5d789a43513a01d7864e0501c685d80308e7b466dd47b28658b,2025-06-23T16:15:28.447000
CVE-2025-6357,0,0,9994f05f11f6fd4f3843657895c3ed7e60bf0cef59fb9fbb76dab8a2b1e4789f,2025-06-20T18:15:29.477000
CVE-2025-6358,0,0,f99bf02cecc343314055e7b36fb7d8f9037e216a78f33ee40b5413a6190a3216,2025-06-20T18:15:29.660000
CVE-2025-6359,0,0,9d007b920753fa0df20b7c612cf2630a29866fc99794bb75396ed51646f5b228,2025-06-20T19:15:37.803000
CVE-2025-6358,0,1,90168a7e5f8bb04f80098d96bc607af18cccd3b433e581f356f31a7c50836f9f,2025-06-23T16:15:28.577000
CVE-2025-6359,0,1,971dd2636f9a6ba83e95d9b37af5b017dc1aff2e022f864346c14d22f1642f48,2025-06-23T16:15:28.707000
CVE-2025-6360,0,0,29092be81e3b76da8c7336c69490f45ea3fdc5ab81dd51a38ebd8491d2510cb3,2025-06-20T19:15:38.023000
CVE-2025-6361,0,0,497d8faf69695876782410eef11eb7c547567394663443e19fb6830ea9f5d580,2025-06-20T20:15:34.633000
CVE-2025-6362,0,0,200f7dcdd01d32c3f0ee5808f9417c4d37452dd91b91b230b5879aeb762b55dc,2025-06-20T20:15:34.820000
CVE-2025-6363,0,0,02ac2f155cec55cb8bc0cf8655350fdcf92c00dcede0bce48e58b81564cda535,2025-06-20T20:15:35.003000
CVE-2025-6364,0,0,006bf7fbb97f6b87a275c265150de651dc85857c35924c5c61f64c74246732f3,2025-06-20T21:15:22.957000
CVE-2025-6365,0,0,e7e0ed9d0d08d064f4be3e304abee4c9926e1d8a86b07b52cae6a84b3ece8e29,2025-06-20T21:15:23.140000
CVE-2025-6367,0,0,d73c83ef68be9737bb36adece1ed10045d8ea359beea0979c29b6d1ef155c944,2025-06-20T21:15:23.327000
CVE-2025-6368,0,1,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000
CVE-2025-6369,0,1,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000
CVE-2025-6370,0,1,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000
CVE-2025-6371,0,1,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000
CVE-2025-6372,0,0,11f261fd4f301b97a69b5991b974c6cc6925c34359044898a0d8cdb4b3c65be3,2025-06-20T23:15:20.077000
CVE-2025-6363,0,1,ab8b6a80460bac6a8b4812f18ab1e9501d5cb1f0c950496fa3871733e7d502dc,2025-06-23T16:15:28.830000
CVE-2025-6364,0,1,a7952d8f2b6f3d7a697638c673b9b44940e0e41de7c45bcb912151791a9d8bc1,2025-06-23T16:15:28.960000
CVE-2025-6365,0,1,fc8714e58327815c646e42087290ed224d315b6d66cea9788d79d9a5202a610f,2025-06-23T16:15:29.093000
CVE-2025-6367,0,1,44fe957d1b3839d7e219e2790bd5d0ed99b3dd2b72cc35955a21c23e4d4c6e1a,2025-06-23T16:15:29.233000
CVE-2025-6368,0,0,b652a69ddcbda2353b55c798f12cf68deb176b8b42a2e80247181195cd741b48,2025-06-23T15:15:29.943000
CVE-2025-6369,0,0,0b71d9d185a33961495404d89996f1b55447f0376b424dc78071d0b32068e6b4,2025-06-23T15:15:30.093000
CVE-2025-6370,0,0,1d309b256ce7676343cc9ab52cdc93b4a1dde8c66fffb7c3460894c8840fdbe6,2025-06-23T15:15:30.220000
CVE-2025-6371,0,0,c724d44e69a50c44fe24bc8706b1a0ea626864ff9482d6c94e657c4b6b0823a0,2025-06-23T15:15:30.370000
CVE-2025-6372,0,1,36c00124f4b93e190073a36ed7b0a2b2147469323e9aef7f9b8c2b21f1929ac6,2025-06-23T16:15:29.363000
CVE-2025-6373,0,0,6e218b88406a89e42e51ab0b6bce2f99cf7c4031ea9443c81ddd02dc9c9521cd,2025-06-21T00:15:22.420000
CVE-2025-6374,0,0,b64de8ac08765ef2aa29524f49bd34819f262290b45c21bdea86cc8246ba3a99,2025-06-21T01:15:29.257000
CVE-2025-6375,0,1,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000
CVE-2025-6375,0,0,a701de4fa9acbeb9a5275341037fb4b17ed765a131529c9f5e2fc59ec01b7bfb,2025-06-23T15:15:30.500000
CVE-2025-6384,0,0,5cdec51953ac45fb27a9189069c1d2dedd736d67cb8696f7a629dd1dd7d1191f,2025-06-19T21:15:27.390000
CVE-2025-6393,0,1,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000
CVE-2025-6394,0,1,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000
CVE-2025-6393,0,0,875eb5cbedee94117eab5461cf902033c5077e7b3e07d0a3bd519e5ba6237345,2025-06-23T15:15:30.647000
CVE-2025-6394,0,0,2eab86707fdfae5ed188daf89a57180ba0c1b5fe5fd120e59affb028d9b4e422,2025-06-23T15:15:30.777000
CVE-2025-6399,0,0,4e1efe71bd5e4cfa8ab2ff5a9127ce00373b7f6790fd011901c9b5eee0f73f6a,2025-06-21T04:15:23.140000
CVE-2025-6400,0,0,748a86d253e9363c04b818e49ea5dee266bc2fc2cefdf3d21460cc5d4fa7f8cf,2025-06-21T06:15:19.577000
CVE-2025-6401,0,0,9d9dd7c8c9a8182d339c1e04938e080d45737af681976610632f07c1158446ae,2025-06-21T07:15:23.197000
CVE-2025-6402,0,0,86e3fb80660b4a0aa440d06524000ca21ff60f631715b366a9d8547e04bbf0c9,2025-06-21T09:15:22.193000
CVE-2025-6403,0,1,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000
CVE-2025-6404,0,1,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000
CVE-2025-6405,0,1,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000
CVE-2025-6406,0,1,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000
CVE-2025-6407,0,1,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000
CVE-2025-6408,0,1,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000
CVE-2025-6403,0,0,016a930de1257f909dfa0214b23b13acb0cbf0721de6e571912b8fb6ece8484e,2025-06-23T15:15:30.903000
CVE-2025-6404,0,0,99cf4fdc5c22d9c49f68f5b5bad6481bc45b040385f4e422b3f4765bad3cf745,2025-06-23T15:15:31.030000
CVE-2025-6405,0,0,af14a509beaea1890451eac5c54e2f0f4017a137a06b7e6d7bf0352ad8b63992,2025-06-23T15:15:31.153000
CVE-2025-6406,0,0,7e8561f16fc2b274624199aa840c7736970fc25a0c2fc2c1229a7df1fc57a970,2025-06-23T15:15:31.280000
CVE-2025-6407,0,0,08818ab65b4c18d84a6e4b78723522dd326591fa638897bacfc7eaa2b313473a,2025-06-23T15:15:31.400000
CVE-2025-6408,0,0,f6bb2de866b420e94b9e9994a67815e4a12cb8b33f99ec35f27a44695d1baeb7,2025-06-23T15:15:31.527000
CVE-2025-6409,0,0,ab58691f2ecf6e947a9564c4c0156aa3bbf03a9b1aeb4b1e15a35636ca599aaf,2025-06-21T16:15:21.407000
CVE-2025-6410,0,0,c0173d12925efeb271e682924d6b75fbb1583ecd595d8bae5f480e46133161cc,2025-06-21T17:15:23.580000
CVE-2025-6411,0,0,b8157503290e836e4debd48f60c1e95d700074b4878a50f7f6bd70907c82b061,2025-06-21T17:15:23.800000
CVE-2025-6412,0,0,6bba585df4a6a1290d4defcad0a067fb3000d58fdf83ecbd8be32ef6de55500b,2025-06-21T18:15:23.830000
CVE-2025-6413,0,1,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000
CVE-2025-6414,0,1,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000
CVE-2025-6415,0,1,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000
CVE-2025-6416,0,1,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000
CVE-2025-6417,0,1,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000
CVE-2025-6418,0,1,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000
CVE-2025-6419,0,1,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000
CVE-2025-6420,0,1,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000
CVE-2025-6421,0,1,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000
CVE-2025-6413,0,0,878d96cbd6373d4bbcbc7eac8e3f7b883bbdaf9647b3f8f01ffac49243778471,2025-06-23T15:15:31.657000
CVE-2025-6414,0,0,9ea807bf9a81de1a2d462892ae7f6f355ac53ddfc19e9289e4d524342b29c22f,2025-06-23T15:15:31.800000
CVE-2025-6415,0,0,bb5f0509b2887c056c271bf0f45ad9b70fe18acfadfacee68c2b844e143fff5b,2025-06-23T15:15:31.930000
CVE-2025-6416,0,0,f6e0cd95d0883543e0d1f97d7088ef861ad9953436aa8a1283aa7bb720c6959e,2025-06-23T15:15:32.057000
CVE-2025-6417,0,0,ed608dcd14204e3f1e89582f0fde89c7cb1601320a169263aa0d5bde1a7f6d40,2025-06-23T15:15:32.183000
CVE-2025-6418,0,0,3e0b567697264438b4f5b77b0ab4d0f48f168ad26c7f87494ad73e30925bd25e,2025-06-23T15:15:32.307000
CVE-2025-6419,0,0,8c6e63e1663c741684ad25c792cd159705ea320552f15b4bb98108113d175ee6,2025-06-23T15:15:32.433000
CVE-2025-6420,0,0,cdb75dba0b5ce7b892adebfa0b9d7a45ff81df4b0222d01fde6da32f8eeab99c,2025-06-23T15:15:32.560000
CVE-2025-6421,0,0,af5baab7d33200cd061f296b00b3de92031f238f561e3eb614150bcb8ec563fa,2025-06-23T15:15:32.680000
CVE-2025-6422,0,0,c573c4db3c0f20957365ddf4fca4d8cd722bee1aea05672517904a42b456062e,2025-06-21T23:15:24.563000
CVE-2025-6446,0,0,44bb6e746b3927f98410a922df7f49f7dfc756465d7a1b8c41e32b3d72a60ca9,2025-06-21T23:15:24.743000
CVE-2025-6447,0,0,d6e53d5485fb5a3d0f12bc8d5c88d5554f6d7639b5607c74f1cea40c03552c01,2025-06-22T00:15:25.220000
@ -299047,14 +299054,14 @@ CVE-2025-6448,0,0,40cda260ec27fd5e0737735c0c34194b09100006124949d443f7335c8e347f
CVE-2025-6449,0,0,116d3d2e21456f110f9a0f23b1e214947937874eabee1f30050b1cc53b689b69,2025-06-22T01:15:24.283000
CVE-2025-6450,0,0,7799bb9dd2f2f68c9e0b3e0363e03394a18b58a0cbe8e725f2b08981ea76741f,2025-06-22T01:15:24.470000
CVE-2025-6451,0,0,ddfd5352b74ff29f320f2da5b49b9c3961bbabfa82ef06d1c3b29e20d8991728,2025-06-22T02:15:22.983000
CVE-2025-6452,0,1,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000
CVE-2025-6453,0,1,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000
CVE-2025-6455,0,1,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000
CVE-2025-6456,0,1,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000
CVE-2025-6457,0,1,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000
CVE-2025-6458,0,1,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000
CVE-2025-6466,0,1,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000
CVE-2025-6467,0,1,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000
CVE-2025-6452,0,0,63ff1d707c2d4d6191c1be973aa90ec67a6c1acf6baf2f39ac5a900fd758b3a4,2025-06-23T15:15:32.813000
CVE-2025-6453,0,0,9c885666116121e3b884ab4ff5531440727d5c1418716ceb5b840c4a9a393584,2025-06-23T15:15:32.937000
CVE-2025-6455,0,0,28c74c7cb9544884eb7535a971765d74e5d1c3f96dacbf9c086677c417a5fa5b,2025-06-23T15:15:33.073000
CVE-2025-6456,0,0,2d820c12caf403f62a3f4e6b3131debc016ddc24e6880c7d796407e57d2acd28,2025-06-23T15:15:33.230000
CVE-2025-6457,0,0,3ed47e74d5401b3a49a017fb16219dec6ef33a4d30b3bc35a29970e3e4dc0115,2025-06-23T15:15:33.357000
CVE-2025-6458,0,0,e8f22c4aef78a28ac9577ad7f726df891a8351f52465f7e1cd96b0890bbdc9a6,2025-06-23T15:15:33.497000
CVE-2025-6466,0,0,4976e85db194b48b1567167c969a847ccee78fb03413b69a23ee3e29a3acbdf7,2025-06-23T15:15:34.440000
CVE-2025-6467,0,0,9a3adfa72fc7506ba417d1a5a324fa98822d0838dfb58a14722e7ce6d55815b0,2025-06-23T14:15:27.473000
CVE-2025-6468,0,0,fbd044ac936e33262d45471d5bd03b56e48368b2b44c1a71ed9578ebf513d15a,2025-06-22T08:15:24.677000
CVE-2025-6469,0,0,9aabfd74ea6320805ce8b656f216d435faba1feb3077facc77facf7f64092150,2025-06-22T08:15:25.497000
CVE-2025-6470,0,0,5f23ea5ce0815ab35440026fa17de2e18509ec334d3f2e6b8233a9348a155287,2025-06-22T09:15:25.157000
@ -299064,7 +299071,7 @@ CVE-2025-6473,0,0,09409a4bd477f81614d70281f18b72d4f6fa78f49d1117127779c435ad3600
CVE-2025-6474,0,0,3e39c8512816416fe8c7ddf5aaed888f37c2634d5d80b0be4ec720b4c35ad5bc,2025-06-22T12:15:19.777000
CVE-2025-6475,0,0,0344ea1c6e041c7440b343720387b9179b9f0e1cabde7f3aafb90f7057fbc66d,2025-06-22T12:15:20.747000
CVE-2025-6476,0,0,d7334e2904c03dcecdcfc40845defacdd1ecf8afbe242a8181c73133e9d019d9,2025-06-22T13:15:34.470000
CVE-2025-6477,0,1,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000
CVE-2025-6477,0,0,cfa2bd7fef0c902e2c30cad9bf680868cbf861e0fe517c90d1aa7af0157fb159,2025-06-23T14:15:28.330000
CVE-2025-6478,0,0,e86ea84207021fa44f32275e31374d82feb873262d1459f18c9a2e5fc8fad6ff,2025-06-22T14:15:21.467000
CVE-2025-6479,0,0,87049c82e93ed13079449e8a426feaafd7bcde7e185f10e9339b40c6bd40b18b,2025-06-22T14:15:22.193000
CVE-2025-6480,0,0,ac6d9565637ad4389fcc04e1bcce035789833b9f48dd1e237c00ebd5f3337e48,2025-06-22T15:15:20.030000
@ -299082,11 +299089,15 @@ CVE-2025-6493,0,0,b07984a53cd9acdb838d53ec36f19bf2b78d39f60ec9fbcd3799653f00698e
CVE-2025-6494,0,0,86f1220d913db6a1ab74494e021685dc10d3e076bd7d139d8673bfd67dc71200,2025-06-22T23:15:20.103000
CVE-2025-6496,0,0,2b5f2de3f64d739030644e9cc059b885cfe6a37938dff98fe008e38153a2053e,2025-06-23T00:15:23.117000
CVE-2025-6497,0,0,dc164f05cd4fbed7722e13df6028fdc1267acb81bac64b9f55e604144a684c22,2025-06-23T01:15:22.073000
CVE-2025-6498,0,1,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000
CVE-2025-6499,0,1,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000
CVE-2025-6500,0,1,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000
CVE-2025-6501,0,1,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000
CVE-2025-6498,0,0,7f117998d5758a3fbc3c030e1b3c62d5890f5ff09de5b53e7b548389eb48d7d0,2025-06-23T14:15:28.950000
CVE-2025-6499,0,0,4eb7250c581d89d97dd682ec0d42a8210a61278e9906826875a49855348b804e,2025-06-23T14:15:29.077000
CVE-2025-6500,0,0,881dc0d608000677c0cffd31356201096e6e26efc4f18eec38a2cb5c495a0250,2025-06-23T14:15:29.207000
CVE-2025-6501,0,0,d375b1fdb8f2189e2cf1c0ea6bab2b673a1f6050f3aa39ea576b3b9a0851ae19,2025-06-23T14:15:29.337000
CVE-2025-6502,0,0,dee39bba679fa1664ff5ffd6d1f5297b6166726b2901546250d37a4402661b97,2025-06-23T04:15:24.780000
CVE-2025-6503,0,0,09279d17f7c61f97e4798e7b6e3c3fe45d55c669f7d25ad1125f5eab7e1ec9d8,2025-06-23T04:15:42.737000
CVE-2025-6509,1,1,2aac3f390efb001eb5e772abfe22fa572851732ca789fb54373fe951baac1f4b,2025-06-23T16:15:29.560000
CVE-2025-6510,1,1,e99e364cac546b151f8c26db6330a22c841229fd024490545442019c2170bf2d,2025-06-23T16:15:29.770000
CVE-2025-6511,1,1,4689ea3fded3deafcf094dc9c193908921ce796acb819025e59f821328837b70,2025-06-23T17:15:32.347000
CVE-2025-6512,0,0,929074c40784a8a7e4bea63b3e8fde745aecb9b4aac7e380dbea6fff6bf1a027,2025-06-23T13:15:22.460000
CVE-2025-6513,0,0,fce112496af3766c83513d2f7532743c646a19af3da3761627887efca2174e9f,2025-06-23T13:15:23.040000
CVE-2025-6516,1,1,e1b221c85d85f1613a82baa969aaa96dac7131ffc9bbbcdaf0ed77517e236f49,2025-06-23T17:15:32.550000

Can't render this file because it is too large.