Auto-Update: 2025-06-26T18:00:18.817510+00:00

This commit is contained in:
cad-safe-bot 2025-06-26 18:03:55 +00:00
parent d9937e5827
commit 2a2a2ecd7b
58 changed files with 3720 additions and 346 deletions

View File

@ -2,7 +2,7 @@
"id": "CVE-2010-5305",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2019-03-26T18:29:00.263",
"lastModified": "2025-04-14T22:15:15.097",
"lastModified": "2025-06-26T17:15:28.510",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -159,13 +159,8 @@
],
"references": [
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-10-070-02",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Mitigation",
"Third Party Advisory",
"US Government Resource"
]
"url": "http://rockwellautomation.custhelp.com/app/answers/detail/a_id/66684/kw/vulnerability/r_id/115100",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-10-070-02",

View File

@ -2,7 +2,7 @@
"id": "CVE-2019-6535",
"sourceIdentifier": "ics-cert@hq.dhs.gov",
"published": "2019-02-05T19:29:00.243",
"lastModified": "2024-11-21T04:46:38.847",
"lastModified": "2025-06-26T17:15:29.873",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
@ -17,6 +17,26 @@
],
"metrics": {
"cvssMetricV31": [
{
"source": "ics-cert@hq.dhs.gov",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
},
{
"source": "nvd@nist.gov",
"type": "Primary",
@ -602,12 +622,8 @@
]
},
{
"url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-029-02",
"source": "ics-cert@hq.dhs.gov",
"tags": [
"Third Party Advisory",
"US Government Resource"
]
"url": "https://www.cisa.gov/news-events/ics-advisories/icsa-19-029-02",
"source": "ics-cert@hq.dhs.gov"
},
{
"url": "http://www.securityfocus.com/bid/106771",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-47029",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T18:15:20.630",
"lastModified": "2025-06-23T20:16:21.633",
"lastModified": "2025-06-26T16:15:24.467",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v.1.5.1 allows a remote attacker to execute arbitrary code and obtain sensitive information via a crafted POST request to the UserService component"
},
{
"lang": "es",
"value": "Un problema en NCR Terminal Handler v.1.5.1 permite que un atacante remoto ejecute c\u00f3digo arbitrario y obtenga informaci\u00f3n confidencial a trav\u00e9s de una solicitud POST manipulada para el componente UserService."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1oX5uKnWGiYMaBxnBuqPiOA53XLxv1Ef4/view?usp=sharing",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-47294",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.493",
"lastModified": "2025-06-23T20:16:21.633",
"lastModified": "2025-06-26T16:15:25.483",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue in NCR Terminal Handler v1.5.1 allows low-level privileged authenticated attackers to arbitrarily deactivate, lock, and delete user accounts via a crafted session cookie."
},
{
"lang": "es",
"value": "Un problema en NCR Terminal Handler v1.5.1 permite que atacantes autenticados con privilegios de bajo nivel desactiven, bloqueen y eliminen arbitrariamente cuentas de usuario a trav\u00e9s de una cookie de sesi\u00f3n manipulada espec\u00edficamente."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.2
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://drive.google.com/file/d/1owG3_2oVpoCb34Mb7nCYZNrjW8cFxpzN/view?usp=sharing",

View File

@ -2,16 +2,55 @@
"id": "CVE-2023-50450",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-23T16:15:24.743",
"lastModified": "2025-06-23T20:16:21.633",
"lastModified": "2025-06-26T16:15:25.700",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in Sensopart VISOR Vision Sensors before 2.10.0.2 allows local users to perform unspecified actions with elevated privileges."
},
{
"lang": "es",
"value": "Se descubri\u00f3 un problema en Sensopart VISOR Vision Sensors anteriores a 2.10.0.2 que permit\u00eda a los usuarios locales realizar acciones no especificadas con privilegios elevados."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.4,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"metrics": {},
"references": [
{
"url": "https://code-white.com/public-vulnerability-list/",

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-52928",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T17:15:30.287",
"lastModified": "2025-06-26T17:15:30.287",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Arc before 1.26.1 on Windows has a bypass issue in the site settings that allows websites (with previously granted permissions) to add new permissions when the user clicks anywhere on the website."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cve@mitre.org",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:L",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"references": [
{
"url": "https://arc.net/security/bulletins#windows-site-settings-bypass-cve-2024-52928",
"source": "cve@mitre.org"
},
{
"url": "https://thebrowser.company",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-56915",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T15:15:22.570",
"lastModified": "2025-06-26T15:15:22.570",
"lastModified": "2025-06-26T16:15:25.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://github.com/netbox-community/netbox/releases/tag/v4.1.7",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-27587",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-16T22:15:44.093",
"lastModified": "2025-06-17T20:50:23.507",
"lastModified": "2025-06-26T17:15:30.497",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -22,7 +22,42 @@
"value": "OpenSSL 3.0.0 a 3.3.2 en la arquitectura PowerPC es vulnerable a un ataque Minerva. Este ataque se puede explotar midiendo el tiempo de firma de mensajes aleatorios mediante la API EVP_DigestSign y, posteriormente, utilizando la clave privada para extraer el valor K (nonce) de las firmas. A continuaci\u00f3n, bas\u00e1ndose en el tama\u00f1o en bits del nonce extra\u00eddo, se puede comparar el tiempo de firma de nonces de tama\u00f1o completo con el de firmas que utilizan nonces m\u00e1s peque\u00f1os mediante pruebas estad\u00edsticas. Existe un canal lateral en la curva P-364 que permite la extracci\u00f3n de la clave privada (adem\u00e1s, existe una dependencia entre el tama\u00f1o en bits de K y el tama\u00f1o del canal lateral). NOTA: Esta CVE es controvertida porque la pol\u00edtica de seguridad de OpenSSL indica expl\u00edcitamente que cualquier canal lateral que requiera la detecci\u00f3n del mismo sistema f\u00edsico queda fuera del modelo de amenazas del software. La se\u00f1al de tiempo es tan peque\u00f1a que es imposible detectarla sin que el proceso atacante se ejecute en el mismo sistema f\u00edsico."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-385"
}
]
}
],
"references": [
{
"url": "https://github.com/openssl/openssl/issues/24253",

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-29331",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T15:15:22.690",
"lastModified": "2025-06-26T15:15:22.690",
"lastModified": "2025-06-26T16:15:26.300",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "An issue in MHSanaei 3x-ui before v.2.5.3 and before allows a remote attacker to execute arbitrary code via the management script x-ui passes the no check certificate option to wget when downloading updates"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-295"
}
]
}
],
"references": [
{
"url": "https://github.com/MHSanaei/3x-ui/pull/2661",

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-30131",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T17:15:30.743",
"lastModified": "2025-06-26T17:15:30.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered on IROAD Dashcam FX2 devices. An unauthenticated file upload endpoint can be leveraged to execute arbitrary commands by uploading a CGI-based webshell. Once a file is uploaded, the attacker can execute commands with root privileges, gaining full control over the dashcam. Additionally, by uploading a netcat (nc) binary, the attacker can establish a reverse shell, maintaining persistent remote and privileged access to the device. This allows complete device takeover."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/geo-chen/IROAD?tab=readme-ov-file#finding-11---cve-2025-30131-unrestricted-webshell",
"source": "cve@mitre.org"
},
{
"url": "https://www.iroadau.com.au/downloads/",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,106 @@
{
"id": "CVE-2025-34042",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:27.197",
"lastModified": "2025-06-26T16:15:27.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An authenticated command injection vulnerability exists in the Beward N100 IP Camera firmware version M2.1.6.04C014 via the ServerName and TimeZone parameters in the servetest CGI page. An attacker with access to the web interface can inject arbitrary system commands into these parameters, which are unsafely embedded into backend system calls without proper input sanitization. Successful exploitation results in remote code execution with root privileges."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://cxsecurity.com/issue/WLB-2019020042",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://packetstorm.news/files/id/151531",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://s4e.io/tools/beward-n100-h264-vga-ip-camera-arbitrary-file-disclosure",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/beward-n100-remote-command-execution",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.beward.net",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.fortiguard.com/encyclopedia/ips/48618",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5512.php",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,102 @@
{
"id": "CVE-2025-34043",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:27.490",
"lastModified": "2025-06-26T16:15:27.490",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote command injection vulnerability exists in Vacron Network Video Recorder (NVR) devices v1.4 due to improper input sanitization in the board.cgi script. The vulnerability allows unauthenticated attackers to pass arbitrary commands to the underlying operating system via crafted HTTP requests. These commands are executed with the privileges of the web server process, enabling remote code execution and potential full device compromise."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://ssd-disclosure.com/ssd-advisory-vacron-nvr-remote-command-execution/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/vacron-nvr-remote-command-execution",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.broadcom.com/support/security-center/attacksignatures/detail?asid=30386",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.sonicwall.com/blog/vacron-network-video-recorder-remote-command-execution",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.tenable.com/plugins/nessus/104124",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.vacron.com/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,102 @@
{
"id": "CVE-2025-34044",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:27.670",
"lastModified": "2025-06-26T16:15:27.670",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A remote command injection vulnerability exists in the confirm.php interface of the WIFISKY 7-layer Flow Control Router via a specially-crafted HTTP GET request to the t parameter. Insufficient input validation allows unauthenticated attackers to execute arbitrary OS commands."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "http://www.szwifisky.com/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/vulnerabilities/other/wifisky7-rce.yaml",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://s4e.io/tools/wifisky-7-layer-flow-control-router-remote-code-execution",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/wifisky-flow-control-router-rce",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-45363",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.variotdbs.pl/vuln/VAR-202107-1715/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34045",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:27.830",
"lastModified": "2025-06-26T16:15:27.830",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in WeiPHP 5.0, an open source WeChat public account platform development framework by Shenzhen Yuanmengyun Technology Co., Ltd. The flaw occurs in the picUrl parameter of the /public/index.php/material/Material/_download_imgage endpoint, where insufficient input validation allows unauthenticated remote attackers to perform directory traversal via crafted POST requests. This enables arbitrary file read on the server, potentially exposing sensitive information such as configuration files and source code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
},
{
"lang": "en",
"value": "CWE-200"
}
]
}
],
"references": [
{
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2020/CNVD-2020-68596.yaml",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/weiphp-path-traversal-file-read",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2020-68596",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34046",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:27.987",
"lastModified": "2025-06-26T16:15:27.987",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated file upload vulnerability exists in the Fanwei E-Office <= v9.4 web management interface. The vulnerability affects the /general/index/UploadFile.php endpoint, which improperly validates uploaded files when invoked with certain parameters (uploadType=eoffice_logo or uploadType=theme). An attacker can exploit this flaw by sending a crafted HTTP POST request to upload arbitrary files without requiring authentication. Successful exploitation could enable remote code execution on the affected server, leading to complete compromise of the web application and potentially the underlying system."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-94"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://github.com/M0ge/CNVD-2021-49104-Fanwei-Eoffice-fileupload/blob/main/eoffice_fileupload.py",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-49104.yaml",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/fanwei-eoffice-file-upload",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-49104",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34047",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:28.140",
"lastModified": "2025-06-26T16:15:28.140",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the Leadsec SSL VPN (formerly Lenovo NetGuard), allowing unauthenticated attackers to read arbitrary files on the underlying system via the ostype parameter in the /vpn/user/download/client endpoint. This flaw arises from insufficient input sanitation, enabling traversal sequences\u00a0to escape the intended directory and access sensitive files."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cnvd/2021/CNVD-2021-64035.yaml",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/leadsec-vpn-path-traversal-file-read",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-64035",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.leadsec.com.cn/",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-34048",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:28.273",
"lastModified": "2025-06-26T16:15:28.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A path traversal vulnerability exists in the web management interface of D-Link DSL-2730U, DSL-2750U, and DSL-2750E ADSL routers with firmware versions IN_1.02, SEA_1.04, and SEA_1.07. The vulnerability is due to insufficient input validation on the getpage parameter within the /cgi-bin/webproc CGI script. This flaw allows an unauthenticated remote attacker to perform path traversal attacks by supplying crafted requests, enabling arbitrary file read on the affected device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://github.com/threat9/routersploit/blob/master/routersploit/modules/exploits/routers/dlink/dsl_2730_2750_path_traversal.py",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/dlink-dsl-routers-path-traversal-file-read",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.dlink.com",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/40735",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,90 @@
{
"id": "CVE-2025-34049",
"sourceIdentifier": "disclosure@vulncheck.com",
"published": "2025-06-26T16:15:28.413",
"lastModified": "2025-06-26T16:15:28.413",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An OS command injection vulnerability exists in the OptiLink ONT1GEW GPON router firmware version V2.1.11_X101 Build 1127.190306 and earlier. The router\u2019s web management interface fails to properly sanitize user input in the target_addr parameter of the formTracert and formPing administrative endpoints. An authenticated attacker can inject arbitrary operating system commands, which are executed with root privileges, leading to remote code execution. Successful exploitation enables full compromise of the device."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "disclosure@vulncheck.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-78"
}
]
}
],
"references": [
{
"url": "https://optilinknetwork.com/",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://vulncheck.com/advisories/optilink-ont1gew-router-rce",
"source": "disclosure@vulncheck.com"
},
{
"url": "https://www.exploit-db.com/exploits/49955",
"source": "disclosure@vulncheck.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-36034",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-06-26T16:15:28.567",
"lastModified": "2025-06-26T16:15:28.567",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM InfoSphere DataStage Flow Designer in IBM InfoSphere Information Server 11.7 discloses sensitive user information in API requests in clear text that could be intercepted using man in the middle techniques."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-319"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7237604",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,25 @@
{
"id": "CVE-2025-44141",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T16:15:28.753",
"lastModified": "2025-06-26T16:15:28.753",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Cross-Site Scripting (XSS) vulnerability exists in the node creation form of Backdrop CMS 1.30."
}
],
"metrics": {},
"references": [
{
"url": "http://backdrop.com",
"source": "cve@mitre.org"
},
{
"url": "https://scandalous-author-611.notion.site/CVE-2025-44141-21d29577f39e802480a2efab13e66c61",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-45526",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-17T20:15:32.243",
"lastModified": "2025-06-18T19:15:21.853",
"lastModified": "2025-06-26T16:15:29.013",
"vulnStatus": "Awaiting Analysis",
"cveTags": [
{
@ -49,7 +49,7 @@
"weaknesses": [
{
"source": "cve@mitre.org",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -66,6 +66,10 @@
{
"url": "https://github.com/github/advisory-database/pull/5730",
"source": "cve@mitre.org"
},
{
"url": "https://gist.github.com/Rootingg/483b09b760d031b62b172f2153f3ed2a",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-45784",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T14:15:44.553",
"lastModified": "2025-06-18T15:15:26.710",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:54:43.523",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,77 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:d-link:dph-400se_firmware:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1C5562F5-D61A-4D1F-B899-0C6EEC46DBEF"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:d-link:dph-400se:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E5534B1-36A0-4CC4-A3D4-5BB69026EA51"
}
]
}
]
},
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:d-link:dph-400s_firmware:1.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "88E473A7-5416-4273-B07C-F8A95C6F3E9D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:d-link:dph-400s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3AEF259E-170D-4061-A011-40C16DED82AD"
}
]
}
]
}
],
"references": [
{
"url": "https://cybermaya.in/posts/Post-37/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
},
{
"url": "https://www.dlink.com/en/security-bulletin/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46109",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T15:15:27.430",
"lastModified": "2025-06-18T16:15:27.607",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:51:06.490",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,14 +51,41 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:pbootcms:pbootcms:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.2.5",
"versionEndIncluding": "3.2.10",
"matchCriteriaId": "44A4044B-0AD2-4EF8-9922-E7551D9550D4"
}
]
}
]
}
],
"references": [
{
"url": "http://cocr.cc/2025/04/17/pbootcms/",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/pbootcmspro/PbootCMS/issues/22",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-46157",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-18T14:15:44.687",
"lastModified": "2025-06-18T14:15:44.687",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:53:12.230",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -51,18 +51,45 @@
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:efrotech:timetrax:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A6B0950-B7A3-4F00-9572-CD0754B60859"
}
]
}
]
}
],
"references": [
{
"url": "http://efrotech.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Product"
]
},
{
"url": "http://timetrax.com",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Broken Link"
]
},
{
"url": "https://github.com/morphine009/CVE-2025-46157",
"source": "cve@mitre.org"
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-46158",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-20T18:15:28.440",
"lastModified": "2025-06-23T20:16:21.633",
"lastModified": "2025-06-26T16:15:30.733",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -15,7 +15,42 @@
"value": "Un problema en el kernel de redoxOS antes del commit 5d41cd7c permite que un atacante local provoque una denegaci\u00f3n de servicio a trav\u00e9s de la llamada al sistema `setitimer`"
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.5,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-369"
}
]
}
],
"references": [
{
"url": "https://github.com/Marsman1996/pocs/tree/master/redox/CVE-2025-46158",
@ -28,6 +63,10 @@
{
"url": "https://gitlab.redox-os.org/redox-os/kernel/-/merge_requests/386",
"source": "cve@mitre.org"
},
{
"url": "https://gitlab.redox-os.org/redox-os/kernel/-/issues/164",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-50350",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T16:15:30.980",
"lastModified": "2025-06-26T16:15:30.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PHPGurukul Pre-School Enrollment System Project v1.0 is vulnerable to Directory Traversal in manage-classes.php."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/baixiaobi/Pre-School-/blob/main/directory%20traversal%20vulnerability-2.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,21 @@
{
"id": "CVE-2025-51671",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T16:15:31.147",
"lastModified": "2025-06-26T16:15:31.147",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A SQL injection vulnerability was discovered in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability allows remote attackers to execute arbitrary SQL code via the category and categorycode parameters in a POST request to the manage-categories.php file."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-category.md",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-51672",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-26T15:15:23.140",
"lastModified": "2025-06-26T15:15:23.140",
"lastModified": "2025-06-26T16:15:31.347",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -11,7 +11,42 @@
"value": "A time-based blind SQL injection vulnerability was identified in the PHPGurukul Dairy Farm Shop Management System 1.3. The vulnerability exists in the manage-companies.php file and allows remote attackers to execute arbitrary SQL code via the companyname parameter in a POST request."
}
],
"metrics": {},
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.1,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/rtnthakur/CVE/blob/main/PHPGurukul/Dairy-Farm-Shop-Management-System/SQL/SQL_injection_edit-company.md",

View File

@ -0,0 +1,68 @@
{
"id": "CVE-2025-52477",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-26T17:15:30.897",
"lastModified": "2025-06-26T17:15:30.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Octo-STS is a GitHub App that acts like a Security Token Service (STS) for the GitHub API. Octo-STS versions before v0.5.3 are vulnerable to unauthenticated SSRF by abusing fields in OpenID Connect tokens. Malicious tokens were shown to trigger internal network requests which could reflect error logs with sensitive information. Upgrade to v0.5.3 to resolve this issue. This version includes patch sets to sanitize input and redact logging."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 4.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://github.com/octo-sts/app/commit/0f177fde54f9318e33f0bba6abaea9463a7c3afd",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octo-sts/app/commit/b3976e39bd8c8c217c0670747d34a4499043da92",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/octo-sts/app/security/advisories/GHSA-h3qp-hwvr-9xcq",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-5209",
"sourceIdentifier": "contact@wpscan.com",
"published": "2025-06-17T06:15:21.870",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:01:40.640",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -39,10 +39,44 @@
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:ivorysearch:ivory_search:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.5.10",
"matchCriteriaId": "22748013-0B1D-4F84-B054-175E592B407B"
}
]
}
]
}
],
"references": [
{
"url": "https://wpscan.com/vulnerability/8b51dc46-62c8-45b5-96ce-fb774b430388/",
"source": "contact@wpscan.com"
"source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6134",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T19:15:34.633",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:46:43.547",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertClient_client_id.md#poc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312603",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312603",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592839",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6135",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T19:15:34.850",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:44:08.650",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,83 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_client_id.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertNominee.php_nominee_id.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312604",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312604",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592840",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592841",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6136",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T20:15:27.863",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:37:17.293",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:projectworlds:life_insurance_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7E652DAE-268A-458B-806B-8C96AA0F0C21"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/YZS17/CVE/blob/main/Life_Insurance_Management_System/sqli_insertPayment.php.md#poc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312605",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312605",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592842",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6137",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T20:15:28.040",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:33:18.123",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -122,28 +122,86 @@
"value": "CWE-120"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*",
"matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF"
}
]
}
]
}
],
"references": [
{
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiScheduleCfg-20ddf0aa11858053a171f052787c202f",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312606",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312606",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592911",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6139",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T21:15:24.513",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:27:37.157",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -120,26 +120,74 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:totolink:t10_firmware:4.1.8cu.5207_b20210320:*:*:*:*:*:*:*",
"matchCriteriaId": "827828BD-015A-458C-8E00-37B2BF489F2D"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:totolink:t10:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D751C3BC-20DC-4896-B334-EE3A00F600BF"
}
]
}
]
}
],
"references": [
{
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-shadow-20ddf0aa118580f5a455cd5dbc521472",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312608",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312608",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.592922",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6159",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T04:15:56.140",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:21:06.720",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/Aalok-zz/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312634",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312634",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593177",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6160",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:21.567",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:15:47.617",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:sourcecodester:downloading_client_database_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9C3702A6-BD59-4AF1-B3FD-5EF35EA9D00D"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/yitianweiming/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312635",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312635",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593216",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6161",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T05:15:21.833",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T16:04:27.483",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-434"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:oretnom23:simple_food_ordering_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D2178235-ED8E-4C5D-90E4-C276B189FB36"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/kakalalaww/CVE/issues/17",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312636",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312636",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593237",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.sourcecodester.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6173",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-17T07:15:18.630",
"lastModified": "2025-06-17T20:50:23.507",
"vulnStatus": "Undergoing Analysis",
"lastModified": "2025-06-26T15:57:47.900",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 1.2,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A58133B7-029B-4E77-8470-C28C0F8CBC35"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/caigo8/CVE-md/blob/main/QloApps/SQL_Injection.md#vulnerability-recurrence",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.312661",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.312661",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593679",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6291",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T01:15:39.067",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:00:25.153",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -131,34 +131,90 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink#poc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313293",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"VDB Entry",
"Permissions Required"
]
},
{
"url": "https://vuldb.com/?id.313293",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593937",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6292",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T01:15:39.257",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:25:51.993",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cna@vuldb.com",
@ -131,34 +131,90 @@
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:dlink:dir-825_firmware:2.03:*:*:*:*:*:*:*",
"matchCriteriaId": "16B2A1A7-07D5-4D0D-9EFC-AA89C1D1B67A"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:dlink:dir-825:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7038F8A9-03F3-4442-B371-84801EF05447"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC#poc",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313294",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313294",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593938",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://www.dlink.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/xiaobor123/vul-finds/tree/main/vul-find-dir825-dlink-sub_4091AC",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6293",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T01:15:39.447",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:22:14.003",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/1xxxgg/cve/issues/3",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313295",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313295",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593996",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/1xxxgg/cve/issues/3",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6294",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T01:15:39.630",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:21:26.107",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/1xxxgg/cve/issues/2",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313296",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313296",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593997",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6295",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T02:15:21.020",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:19:48.817",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,32 +142,84 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabianros:hostel_management_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "85D8BA53-5D51-4862-A704-24DAD75013FA"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/1xxxgg/cve/issues/1",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313297",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313297",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.593998",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://github.com/1xxxgg/cve/issues/1",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6300",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T03:15:28.243",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:14:20.587",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -122,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:phpgurukul:employee_record_management_system:1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF0DB24-A16B-4157-A0AA-66E6B1C08BC0"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/GarminYoung/myCVE/issues/10",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313300",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313300",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.595366",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6301",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T03:15:28.420",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:09:26.040",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -63,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
@ -80,6 +80,26 @@
},
"exploitabilityScore": 0.9,
"impactScore": 1.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
],
"cvssMetricV2": [
@ -122,24 +142,66 @@
"value": "CWE-94"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:anujk305:notice_board_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D07C17AC-0890-411C-8BAF-35EFDD134BAD"
}
]
}
]
}
],
"references": [
{
"url": "https://phpgurukul.com/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://vuldb.com/?ctiid.313301",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313301",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.595373",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,8 +2,8 @@
"id": "CVE-2025-6341",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T13:15:19.980",
"lastModified": "2025-06-23T20:16:40.143",
"vulnStatus": "Awaiting Analysis",
"lastModified": "2025-06-26T17:31:18.840",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
@ -122,28 +122,75 @@
"value": "CWE-862"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:fabian:school_fees_payment_system:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7CA0F147-F254-4156-BAB0-6D889FEEEC1C"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/tuooo/CVE/issues/15",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313336",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313336",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.597023",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6342",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T14:15:32.260",
"lastModified": "2025-06-20T14:15:32.260",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:43:29.243",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. This issue affects some unknown processing of the file /admin/admin_football.php. The manipulation of the argument pid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha detectado una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Este problema afecta a un procesamiento desconocido del archivo /admin/admin_football.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque podr\u00eda ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ltranquility/CVE/issues/7",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313337",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313337",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.597043",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6343",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T14:15:32.667",
"lastModified": "2025-06-20T14:15:32.667",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:41:01.887",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /admin/admin_product.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Online Shoe Store 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /admin/admin_product.php. La manipulaci\u00f3n del argumento pid provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ltranquility/CVE/issues/6",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313338",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313338",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.597044",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,13 +2,17 @@
"id": "CVE-2025-6344",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-20T14:15:32.970",
"lastModified": "2025-06-20T14:15:32.970",
"vulnStatus": "Received",
"lastModified": "2025-06-26T15:38:17.790",
"vulnStatus": "Analyzed",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in code-projects Online Shoe Store 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /contactus.php. The manipulation of the argument email leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se ha encontrado una vulnerabilidad en code-projects Online Shoe Store 1.0, clasificada como cr\u00edtica. Esta vulnerabilidad afecta a una funcionalidad desconocida del archivo /contactus.php. La manipulaci\u00f3n del argumento \"email\" provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {
@ -59,7 +63,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
@ -76,6 +80,26 @@
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
],
"cvssMetricV2": [
@ -118,28 +142,75 @@
"value": "CWE-89"
}
]
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4814A5C5-6D0C-4EA4-8BA8-1309F1913C0A"
}
]
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Product"
]
},
{
"url": "https://github.com/ltranquility/CVE/issues/5",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
]
},
{
"url": "https://vuldb.com/?ctiid.313339",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Permissions Required",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?id.313339",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
},
{
"url": "https://vuldb.com/?submit.597045",
"source": "cna@vuldb.com"
"source": "cna@vuldb.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
]
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6697",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T15:15:24.840",
"lastModified": "2025-06-26T15:15:24.840",
"lastModified": "2025-06-26T16:15:32.560",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.597386",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597386",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-6698",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T15:15:25.023",
"lastModified": "2025-06-26T15:15:25.023",
"lastModified": "2025-06-26T16:15:33.583",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
@ -59,7 +59,7 @@
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
@ -107,7 +107,7 @@
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -136,6 +136,10 @@
{
"url": "https://vuldb.com/?submit.597389",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597389",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6699",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T16:15:34.590",
"lastModified": "2025-06-26T16:15:34.590",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic has been found in LabRedesCefetRJ WeGIA 3.4.0. This affects an unknown part of the file /html/funcionario/cadastro_funcionario.php of the component Cadastro de Funcion\u00e1rio. The manipulation of the argument Nome/Sobrenome leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This is a different issue than CVE-2025-23030. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/RaulPazemecxas/PoCVulDb/blob/main/README7.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313965",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313965",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597401",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6700",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T16:15:35.740",
"lastModified": "2025-06-26T16:15:35.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as problematic was found in Xuxueli xxl-sso 1.1.0. This vulnerability affects unknown code of the file /xxl-sso-server/login. The manipulation of the argument errorMsg leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-01/report.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313966",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313966",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597456",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-6701",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T16:15:36.930",
"lastModified": "2025-06-26T16:15:36.930",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, has been found in Xuxueli xxl-sso 1.1.0. This issue affects some unknown processing of the file /xxl-sso-server/doLogin. The manipulation of the argument redirect_url leads to open redirect. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 3.5,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.1,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-601"
}
]
}
],
"references": [
{
"url": "https://github.com/ShenxiuSec/cve-proofs/blob/main/POC-20250616-02.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313967",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313967",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597472",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-6702",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-26T16:15:38.033",
"lastModified": "2025-06-26T16:15:38.033",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in linlinjava litemall 1.8.0. Affected is an unknown function of the file /wx/comment/post. The manipulation of the argument adminComment leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N",
"baseScore": 4.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-266"
},
{
"lang": "en",
"value": "CWE-285"
}
]
}
],
"references": [
{
"url": "https://ctf-n0el4kls.notion.site/Litemall-Mass-Assignment-Vulnerability-in-wx-comment-post-21441990f447808b86d1cb15e37ecae9?source=copy_link",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313968",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313968",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.597473",
"source": "cna@vuldb.com"
}
]
}

104
README.md
View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-26T16:00:26.737438+00:00
2025-06-26T18:00:18.817510+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-26T15:35:49.490000+00:00
2025-06-26T17:31:18.840000+00:00
```
### Last Data Feed Release
@ -33,69 +33,63 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299452
299471
```
### CVEs added in the last Commit
Recently added CVEs: `27`
Recently added CVEs: `19`
- [CVE-2025-48921](CVE-2025/CVE-2025-489xx/CVE-2025-48921.json) (`2025-06-26T14:15:30.043`)
- [CVE-2025-48922](CVE-2025/CVE-2025-489xx/CVE-2025-48922.json) (`2025-06-26T14:15:30.180`)
- [CVE-2025-48923](CVE-2025/CVE-2025-489xx/CVE-2025-48923.json) (`2025-06-26T14:15:30.300`)
- [CVE-2025-49003](CVE-2025/CVE-2025-490xx/CVE-2025-49003.json) (`2025-06-26T14:15:30.433`)
- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T15:15:23.140`)
- [CVE-2025-52573](CVE-2025/CVE-2025-525xx/CVE-2025-52573.json) (`2025-06-26T14:15:30.577`)
- [CVE-2025-52887](CVE-2025/CVE-2025-528xx/CVE-2025-52887.json) (`2025-06-26T15:15:23.350`)
- [CVE-2025-52900](CVE-2025/CVE-2025-529xx/CVE-2025-52900.json) (`2025-06-26T15:15:23.520`)
- [CVE-2025-52902](CVE-2025/CVE-2025-529xx/CVE-2025-52902.json) (`2025-06-26T15:15:23.687`)
- [CVE-2025-53002](CVE-2025/CVE-2025-530xx/CVE-2025-53002.json) (`2025-06-26T15:15:23.873`)
- [CVE-2025-53007](CVE-2025/CVE-2025-530xx/CVE-2025-53007.json) (`2025-06-26T15:15:24.043`)
- [CVE-2025-5682](CVE-2025/CVE-2025-56xx/CVE-2025-5682.json) (`2025-06-26T14:15:31.280`)
- [CVE-2025-6674](CVE-2025/CVE-2025-66xx/CVE-2025-6674.json) (`2025-06-26T14:15:34.047`)
- [CVE-2025-6675](CVE-2025/CVE-2025-66xx/CVE-2025-6675.json) (`2025-06-26T14:15:34.177`)
- [CVE-2025-6676](CVE-2025/CVE-2025-66xx/CVE-2025-6676.json) (`2025-06-26T14:15:34.353`)
- [CVE-2025-6677](CVE-2025/CVE-2025-66xx/CVE-2025-6677.json) (`2025-06-26T14:15:34.540`)
- [CVE-2025-6694](CVE-2025/CVE-2025-66xx/CVE-2025-6694.json) (`2025-06-26T14:15:34.777`)
- [CVE-2025-6695](CVE-2025/CVE-2025-66xx/CVE-2025-6695.json) (`2025-06-26T14:15:34.967`)
- [CVE-2025-6696](CVE-2025/CVE-2025-66xx/CVE-2025-6696.json) (`2025-06-26T15:15:24.633`)
- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T15:15:24.840`)
- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T15:15:25.023`)
- [CVE-2025-6706](CVE-2025/CVE-2025-67xx/CVE-2025-6706.json) (`2025-06-26T14:15:35.157`)
- [CVE-2025-6707](CVE-2025/CVE-2025-67xx/CVE-2025-6707.json) (`2025-06-26T14:15:35.313`)
- [CVE-2025-6709](CVE-2025/CVE-2025-67xx/CVE-2025-6709.json) (`2025-06-26T14:15:35.463`)
- [CVE-2025-6710](CVE-2025/CVE-2025-67xx/CVE-2025-6710.json) (`2025-06-26T14:15:35.613`)
- [CVE-2024-52928](CVE-2024/CVE-2024-529xx/CVE-2024-52928.json) (`2025-06-26T17:15:30.287`)
- [CVE-2025-30131](CVE-2025/CVE-2025-301xx/CVE-2025-30131.json) (`2025-06-26T17:15:30.743`)
- [CVE-2025-34042](CVE-2025/CVE-2025-340xx/CVE-2025-34042.json) (`2025-06-26T16:15:27.197`)
- [CVE-2025-34043](CVE-2025/CVE-2025-340xx/CVE-2025-34043.json) (`2025-06-26T16:15:27.490`)
- [CVE-2025-34044](CVE-2025/CVE-2025-340xx/CVE-2025-34044.json) (`2025-06-26T16:15:27.670`)
- [CVE-2025-34045](CVE-2025/CVE-2025-340xx/CVE-2025-34045.json) (`2025-06-26T16:15:27.830`)
- [CVE-2025-34046](CVE-2025/CVE-2025-340xx/CVE-2025-34046.json) (`2025-06-26T16:15:27.987`)
- [CVE-2025-34047](CVE-2025/CVE-2025-340xx/CVE-2025-34047.json) (`2025-06-26T16:15:28.140`)
- [CVE-2025-34048](CVE-2025/CVE-2025-340xx/CVE-2025-34048.json) (`2025-06-26T16:15:28.273`)
- [CVE-2025-34049](CVE-2025/CVE-2025-340xx/CVE-2025-34049.json) (`2025-06-26T16:15:28.413`)
- [CVE-2025-36034](CVE-2025/CVE-2025-360xx/CVE-2025-36034.json) (`2025-06-26T16:15:28.567`)
- [CVE-2025-44141](CVE-2025/CVE-2025-441xx/CVE-2025-44141.json) (`2025-06-26T16:15:28.753`)
- [CVE-2025-50350](CVE-2025/CVE-2025-503xx/CVE-2025-50350.json) (`2025-06-26T16:15:30.980`)
- [CVE-2025-51671](CVE-2025/CVE-2025-516xx/CVE-2025-51671.json) (`2025-06-26T16:15:31.147`)
- [CVE-2025-52477](CVE-2025/CVE-2025-524xx/CVE-2025-52477.json) (`2025-06-26T17:15:30.897`)
- [CVE-2025-6699](CVE-2025/CVE-2025-66xx/CVE-2025-6699.json) (`2025-06-26T16:15:34.590`)
- [CVE-2025-6700](CVE-2025/CVE-2025-67xx/CVE-2025-6700.json) (`2025-06-26T16:15:35.740`)
- [CVE-2025-6701](CVE-2025/CVE-2025-67xx/CVE-2025-6701.json) (`2025-06-26T16:15:36.930`)
- [CVE-2025-6702](CVE-2025/CVE-2025-67xx/CVE-2025-6702.json) (`2025-06-26T16:15:38.033`)
### CVEs modified in the last Commit
Recently modified CVEs: `25`
Recently modified CVEs: `37`
- [CVE-2024-51977](CVE-2024/CVE-2024-519xx/CVE-2024-51977.json) (`2025-06-26T15:15:22.167`)
- [CVE-2025-44203](CVE-2025/CVE-2025-442xx/CVE-2025-44203.json) (`2025-06-20T16:15:28.700`)
- [CVE-2025-45784](CVE-2025/CVE-2025-457xx/CVE-2025-45784.json) (`2025-06-18T15:15:26.710`)
- [CVE-2025-45890](CVE-2025/CVE-2025-458xx/CVE-2025-45890.json) (`2025-06-20T16:15:29.240`)
- [CVE-2025-46109](CVE-2025/CVE-2025-461xx/CVE-2025-46109.json) (`2025-06-18T16:15:27.607`)
- [CVE-2025-46157](CVE-2025/CVE-2025-461xx/CVE-2025-46157.json) (`2025-06-18T14:15:44.687`)
- [CVE-2025-46179](CVE-2025/CVE-2025-461xx/CVE-2025-46179.json) (`2025-06-20T15:15:20.860`)
- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-17T20:50:23.507`)
- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-20T14:15:32.260`)
- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-20T14:15:32.667`)
- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-20T14:15:32.970`)
- [CVE-2025-6345](CVE-2025/CVE-2025-63xx/CVE-2025-6345.json) (`2025-06-20T15:15:35.800`)
- [CVE-2025-6346](CVE-2025/CVE-2025-63xx/CVE-2025-6346.json) (`2025-06-20T15:15:35.983`)
- [CVE-2025-6351](CVE-2025/CVE-2025-63xx/CVE-2025-6351.json) (`2025-06-20T16:15:30.250`)
- [CVE-2025-6360](CVE-2025/CVE-2025-63xx/CVE-2025-6360.json) (`2025-06-26T15:35:49.490`)
- [CVE-2025-6361](CVE-2025/CVE-2025-63xx/CVE-2025-6361.json) (`2025-06-26T15:33:24.173`)
- [CVE-2025-6362](CVE-2025/CVE-2025-63xx/CVE-2025-6362.json) (`2025-06-26T15:30:56.573`)
- [CVE-2025-6364](CVE-2025/CVE-2025-63xx/CVE-2025-6364.json) (`2025-06-26T15:28:57.953`)
- [CVE-2025-6436](CVE-2025/CVE-2025-64xx/CVE-2025-6436.json) (`2025-06-26T14:15:32.083`)
- [CVE-2025-6531](CVE-2025/CVE-2025-65xx/CVE-2025-6531.json) (`2025-06-26T15:15:24.250`)
- [CVE-2025-6555](CVE-2025/CVE-2025-65xx/CVE-2025-6555.json) (`2025-06-26T14:15:32.340`)
- [CVE-2025-6556](CVE-2025/CVE-2025-65xx/CVE-2025-6556.json) (`2025-06-26T14:15:32.510`)
- [CVE-2025-6620](CVE-2025/CVE-2025-66xx/CVE-2025-6620.json) (`2025-06-26T14:15:32.737`)
- [CVE-2025-6621](CVE-2025/CVE-2025-66xx/CVE-2025-6621.json) (`2025-06-26T14:15:32.933`)
- [CVE-2025-6624](CVE-2025/CVE-2025-66xx/CVE-2025-6624.json) (`2025-06-26T14:15:33.070`)
- [CVE-2025-46158](CVE-2025/CVE-2025-461xx/CVE-2025-46158.json) (`2025-06-26T16:15:30.733`)
- [CVE-2025-51672](CVE-2025/CVE-2025-516xx/CVE-2025-51672.json) (`2025-06-26T16:15:31.347`)
- [CVE-2025-5209](CVE-2025/CVE-2025-52xx/CVE-2025-5209.json) (`2025-06-26T16:01:40.640`)
- [CVE-2025-6134](CVE-2025/CVE-2025-61xx/CVE-2025-6134.json) (`2025-06-26T16:46:43.547`)
- [CVE-2025-6135](CVE-2025/CVE-2025-61xx/CVE-2025-6135.json) (`2025-06-26T16:44:08.650`)
- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-26T16:37:17.293`)
- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-26T16:33:18.123`)
- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-26T16:27:37.157`)
- [CVE-2025-6159](CVE-2025/CVE-2025-61xx/CVE-2025-6159.json) (`2025-06-26T16:21:06.720`)
- [CVE-2025-6160](CVE-2025/CVE-2025-61xx/CVE-2025-6160.json) (`2025-06-26T16:15:47.617`)
- [CVE-2025-6161](CVE-2025/CVE-2025-61xx/CVE-2025-6161.json) (`2025-06-26T16:04:27.483`)
- [CVE-2025-6173](CVE-2025/CVE-2025-61xx/CVE-2025-6173.json) (`2025-06-26T15:57:47.900`)
- [CVE-2025-6291](CVE-2025/CVE-2025-62xx/CVE-2025-6291.json) (`2025-06-26T17:00:25.153`)
- [CVE-2025-6292](CVE-2025/CVE-2025-62xx/CVE-2025-6292.json) (`2025-06-26T17:25:51.993`)
- [CVE-2025-6293](CVE-2025/CVE-2025-62xx/CVE-2025-6293.json) (`2025-06-26T17:22:14.003`)
- [CVE-2025-6294](CVE-2025/CVE-2025-62xx/CVE-2025-6294.json) (`2025-06-26T17:21:26.107`)
- [CVE-2025-6295](CVE-2025/CVE-2025-62xx/CVE-2025-6295.json) (`2025-06-26T17:19:48.817`)
- [CVE-2025-6300](CVE-2025/CVE-2025-63xx/CVE-2025-6300.json) (`2025-06-26T17:14:20.587`)
- [CVE-2025-6301](CVE-2025/CVE-2025-63xx/CVE-2025-6301.json) (`2025-06-26T17:09:26.040`)
- [CVE-2025-6341](CVE-2025/CVE-2025-63xx/CVE-2025-6341.json) (`2025-06-26T17:31:18.840`)
- [CVE-2025-6342](CVE-2025/CVE-2025-63xx/CVE-2025-6342.json) (`2025-06-26T15:43:29.243`)
- [CVE-2025-6343](CVE-2025/CVE-2025-63xx/CVE-2025-6343.json) (`2025-06-26T15:41:01.887`)
- [CVE-2025-6344](CVE-2025/CVE-2025-63xx/CVE-2025-6344.json) (`2025-06-26T15:38:17.790`)
- [CVE-2025-6697](CVE-2025/CVE-2025-66xx/CVE-2025-6697.json) (`2025-06-26T16:15:32.560`)
- [CVE-2025-6698](CVE-2025/CVE-2025-66xx/CVE-2025-6698.json) (`2025-06-26T16:15:33.583`)
## Download and Usage

View File

@ -46920,7 +46920,7 @@ CVE-2010-5301,0,0,583f9fd1855b9ace664450510c74afa0308b2c32502d708f3d3f65ee639063
CVE-2010-5302,0,0,b62265de4c92e92a54d7af21e552ac20d2c2227e399750b58f8eff05f4537bed,2025-04-12T10:46:40.837000
CVE-2010-5303,0,0,919bf68db8b6d2c5950419ce6e7250d2013f50cfb20cc8a56a52d0fd01c71453,2025-04-12T10:46:40.837000
CVE-2010-5304,0,0,48036b1f373720fee56e102c186ef2e310b690ba81271d62a16d97190ca830d7,2024-11-21T01:22:59.840000
CVE-2010-5305,0,0,085485fc6a88b06e190d257793ca8788456f836c5ff6f108a4a47ab93628111e,2025-04-14T22:15:15.097000
CVE-2010-5305,0,1,499ea1bdb15df7a8d35ce20f05ad9120c34649ed8c4a690075475d3f0091e8be,2025-06-26T17:15:28.510000
CVE-2010-5306,0,0,9f3ea0a94065bb5498fad05090ddf3c76e0c9df583a4b7bc215d0969343ab9d1,2025-04-12T10:46:40.837000
CVE-2010-5307,0,0,bc576dd47d7c761bc7f31868f952c0a795c38e45f0b3ab832ee30e5beaaf3737,2025-04-12T10:46:40.837000
CVE-2010-5308,0,0,6ef7cedc49106e184c9711ac6468d3345c3d283034bdc91feba0c63406f7004c,2025-04-12T10:46:40.837000
@ -141501,7 +141501,7 @@ CVE-2019-6531,0,0,cb8e590b8dc2b819ec3417d9fe3c30485ca87bc7b47bfac77102001703d3c0
CVE-2019-6532,0,0,a7ab7164edd4c12d3debed5586db0a7c6623e927293f801349a342480742ae8b,2024-11-21T04:46:38.490000
CVE-2019-6533,0,0,49b6e28bf6c53111484228f93153f3996088f0421e9034f39c81529e61d45eb9,2024-11-21T04:46:38.613000
CVE-2019-6534,0,0,e5204fe70dc3ff28a7a3db42b94447f761369232b14976f03ea6e86d98ae3939,2024-11-21T04:46:38.723000
CVE-2019-6535,0,0,c389b064cf420992b4cbdb1aa85b69b98f0e3e2df5b26b75b2dc583725661d0e,2024-11-21T04:46:38.847000
CVE-2019-6535,0,1,72c9fe16487beb7a7661e33e88c3d3e4341292d280dffb3c091d5e8eb2300d14,2025-06-26T17:15:29.873000
CVE-2019-6536,0,0,d8e992c6f2fce5b99ce1d72dcd26655f7c91fab051a2222d8b2b4f4bd0830b3e,2024-11-21T04:46:38.983000
CVE-2019-6537,0,0,6c45610650e5ad4f0b15376d8c75ca2fc178e09541e1961c96b819cd77466402,2024-11-21T04:46:39.100000
CVE-2019-6538,0,0,785d0cee55b648926c5eec7c7be1f61aba1bce6d66fce133fdb6b7975e33bf8e,2025-05-22T20:15:20.660000
@ -237904,7 +237904,7 @@ CVE-2023-47020,0,0,77958b1e974ce3a0af29c7a34f0132e69536d415fc0c65e83c01b308bc43d
CVE-2023-47022,0,0,73d82f89852a7fe6d598baa6e948b789fe12b29f69f371d14a570d87cb620bb5,2025-06-17T17:15:31.567000
CVE-2023-47024,0,0,c125fb103042924f5281e92be53a4da5c6431c794e2412cda8329c78f5f25120,2025-06-17T17:15:31.783000
CVE-2023-47025,0,0,66fd4d735d74f56390288fda0ceba4f40992fc464fda52a22d2276e16b06cc2e,2024-11-21T08:29:38.117000
CVE-2023-47029,0,0,12b49b3ede09c8051f0adf031401d06f966f450320e558466627896d3b8f70e3,2025-06-23T20:16:21.633000
CVE-2023-47029,0,1,4a5e4f14db9e64a4730c819d67cb16af7f601e9fe9c282f515ffd92e0e6c576f,2025-06-26T16:15:24.467000
CVE-2023-4703,0,0,a6d5e78e1192a3e0f4c01547c7f4ce3e0b04c7358d175d4096197c6b6119861c,2025-06-20T17:15:34.147000
CVE-2023-47030,0,0,93ccd1f7d36567d2d295f9d2eefa083e76664b4db1969b2faf0e950bfafbca21,2025-06-25T12:50:37.217000
CVE-2023-47031,0,0,a451f00aa91dc8a8504ff9338181d2c777cbbe9a238b568badcf58bf8e44beb3,2025-06-25T13:13:50.157000
@ -238139,7 +238139,7 @@ CVE-2023-4728,0,0,c339ab5d87c7af4ab30b66d47f7562aee044b141169095045add07af35952c
CVE-2023-47282,0,0,93bba9396c0f58046a2b076dfea038b721d5ee4b96d78dc125aa534f53adb836,2024-11-21T08:30:07.197000
CVE-2023-47283,0,0,6caec9eee746cdac4ea27e9ab2b0209b5ee8c2d3553a8d29b97a8533862b9ad7,2024-11-21T08:30:07.433000
CVE-2023-4729,0,0,f77231c363b30e96bfc2db8cebd3839401370fbb7b50252d996e4c9ee1c2023f,2025-01-15T16:31:19.903000
CVE-2023-47294,0,0,d3ea47b285562c39058a8eacb339c5fa3addec63cf1a3e5b9333a2e4450da9ee,2025-06-23T20:16:21.633000
CVE-2023-47294,0,1,298f059dd5123a102ff37a75adfdff11de59ed0a76d591fb6a7672a1acc54a2a,2025-06-26T16:15:25.483000
CVE-2023-47295,0,0,28a72d717c8a4fa3591c8aa3a96aa82e9fec7a018320bb6b31941ca440092c65,2025-06-25T13:30:08.523000
CVE-2023-47297,0,0,c14fd87e4e15a5f8e3c0ca94948127ff1c65a697a69ee20c14900dd6601ff3f3,2025-06-26T12:46:49.080000
CVE-2023-47298,0,0,4c4acd197c7d9d302a966e30e51e5a36b182be0dd23706e335a822f619b88bec,2025-06-26T12:44:00.433000
@ -240480,7 +240480,7 @@ CVE-2023-50447,0,0,3b21483f93a61c36d17c54e0e41c9704319aa4bb30ed9f5f7c0bbdda96e01
CVE-2023-50448,0,0,1356900f30989b11a427d95591f2fc88232d31d851bd0fac96eb18865bdb0f57,2024-11-21T08:37:01.203000
CVE-2023-50449,0,0,ba270c267a15999c5436411e78a8d97ec1196d3bb1ec0bc251b111bb6e5f871a,2024-11-21T08:37:01.360000
CVE-2023-5045,0,0,79d8cf6ee5e9a4b50139a237bce749eaaf7a601766908d94e71febe8668c11b0,2024-11-21T08:40:57.920000
CVE-2023-50450,0,0,45504d3230911e141a0b81195226e9e83abec179bd39db1e436592ff9e3aa99b,2025-06-23T20:16:21.633000
CVE-2023-50450,0,1,1b6cd36b67fe27dd05ee97a39dba06431d3a62ba2619eb6715b633c7d7630ca3,2025-06-26T16:15:25.700000
CVE-2023-50453,0,0,76d310904c175d9636c853af62d4f3f3ad8ffd78a8288d3d4c4903fddbeede50,2024-11-21T08:37:01.517000
CVE-2023-50454,0,0,bfaedf03326a6acc4075b380331bfd96efd576ce55b3819a4e641140e3d7172a,2024-11-21T08:37:01.673000
CVE-2023-50455,0,0,cf36f17a14a454b579fdc438155082da9fe3202a2d2238909649381efcfac5b3,2024-11-21T08:37:01.837000
@ -274832,7 +274832,7 @@ CVE-2024-51962,0,0,aa5b86386886c09d6f7775b329f01551003fe6d3a5aeafe034e2c76e33a39
CVE-2024-51963,0,0,65d15561511f4792024c62d0c3dbbe1a84656f415b27a24cc7fcb099d4df16a8,2025-04-10T20:15:21.723000
CVE-2024-51966,0,0,69a0d46bcaa28466534ecd74cb2be650273566964ba1c75d7e0cb22b97d45b63,2025-04-10T20:15:21.850000
CVE-2024-5197,0,0,3ceed42f5112dd9bd5fe7184078d9498cb21faff4758f60f424f81f723a4d1f0,2024-11-21T09:47:10.363000
CVE-2024-51977,0,1,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000
CVE-2024-51977,0,0,ae0abc3896aa34da58408d57a73670d1ca04bb80f1162d8b9aa7bfda81885d8d,2025-06-26T15:15:22.167000
CVE-2024-51978,0,0,080238c493ca5141a0b64da3bf5cefc734cbe73438596d0d624c9190d618c4c1,2025-06-25T14:15:22.823000
CVE-2024-51979,0,0,ea92e40117ad8fa111fa4480baeb19d3876eb6d36a7c15795f6000e48a841626,2025-06-25T14:15:23.313000
CVE-2024-5198,0,0,3fa9ec394e1888d66e83812554066b455d9458d73cda1ea9275cc8bdd128d3dc,2025-06-10T16:12:09.340000
@ -275470,6 +275470,7 @@ CVE-2024-52923,0,0,1238a4879a0bc2d925f8ecf6f96b3d1c816c52f29e36df61c25ed1ce84892
CVE-2024-52924,0,0,8b254b4a26863de18a0a4930d1f91105918cf608ca8edf047ba4e3990b61fb38,2025-03-07T20:15:37.240000
CVE-2024-52925,0,0,4d21065ff66a1748231e5c3543316979502c5f13302562a708f4fc89ea5a4eb2,2025-02-26T15:15:23.867000
CVE-2024-52926,0,0,5021ba3f217b734483a326034e850572aad7fe69e34251b753d7998240a26e61,2024-12-24T19:15:06.940000
CVE-2024-52928,1,1,61501d64bda944c41887cd192eae26bb5ef6d9f05584bccd2c3019f70d252de6,2025-06-26T17:15:30.287000
CVE-2024-5293,0,0,f489071fddfba63fc047e3d21a5cfec46b34b73b22b63f08d456cdba6a84add5,2024-11-21T09:47:22.487000
CVE-2024-52935,0,0,da218bbcf32aa8ee196d0cc84ac3289085c87dcfe3a543f2e97a81e0e8e7c479,2025-01-13T19:15:10.993000
CVE-2024-52936,0,0,fc5419fb37a8a058b0ac6dbc1882fd48de1fcccd6ca5038c660a45c78f704b96,2025-01-31T17:15:15.567000
@ -278072,7 +278073,7 @@ CVE-2024-56903,0,0,b897be5c821ce23ff62ebbc786466003154e6577f97fa83d87efcf2c721a7
CVE-2024-56908,0,0,bbe0040508ad69151e90ab47c62a14618486e1b0815c01e094680be9e1e713d0,2025-03-17T19:15:24.050000
CVE-2024-5691,0,0,9505e4d65453e2558c96eeea1a67c071cea95e3c90b63f8d9e952db5959b044b,2025-03-19T21:15:37.710000
CVE-2024-56914,0,0,064f87427a8016e13b3b895075549080817f6e33abdd6a0f7fbfa426e2cf3bd7,2025-05-21T16:11:27.750000
CVE-2024-56915,1,1,d0a7ece1ed916208607537f968bfb4040658279997580bd41282170145899660,2025-06-26T15:15:22.570000
CVE-2024-56915,0,1,d1dc048e1760bdf298c6c4a68351a2e047dc4225796624a31f6d3918062444d3,2025-06-26T16:15:25.910000
CVE-2024-56916,0,0,8d791153df4968d3eeeb69a9c48a710c5c1054b60793c3fffc13c78de96c4f0f,2025-06-24T20:15:24.643000
CVE-2024-56917,0,0,22eee042f4d8b258955468fa7b726ed4840860e6e36c91120f332296bae2e2f7,2025-06-24T20:15:24.790000
CVE-2024-56918,0,0,52ee2653b76f15ba0701a308965e0214f9660afd1f602bc274c062083d531183,2025-06-24T20:15:24.953000
@ -290029,7 +290030,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321
CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000
CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000
CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000
CVE-2025-27587,0,0,960b7acde73bcafbbb57e7f733045f5ae624fbfd08a41dbeb9a4515706dcb98c,2025-06-17T20:50:23.507000
CVE-2025-27587,0,1,c6b99f6544f7fddd6a84845f540214401821374f565d374449096dc905b663ad,2025-06-26T17:15:30.497000
CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000
CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000
CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000
@ -290705,7 +290706,7 @@ CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccb
CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
CVE-2025-29331,1,1,90046cc9a3feb2cec161f106e72630fc24bc5ac7fa93d7b91d9be26c030ae076,2025-06-26T15:15:22.690000
CVE-2025-29331,0,1,f0dcafb3ed78607ac3045ba7d382bd813392e80d643543a468e881da18e7a32b,2025-06-26T16:15:26.300000
CVE-2025-29339,0,0,3c8767e6fc1c7537f5abbed85f26508361863e04ceb6434ef3e14faf20c7a82c,2025-06-19T00:23:24.013000
CVE-2025-2935,0,0,7b37cfe809822a560bb0e6dbeb565e9e50c614feb77ac7a6501335760c490b55,2025-06-06T14:07:28.330000
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
@ -291100,6 +291101,7 @@ CVE-2025-30118,0,0,63bb6fe6df661494db5327da07bd867838234c34a82e4f268cbe5bdf2fffb
CVE-2025-30122,0,0,c1d95302660e92c024ec5fc6b6a580530031934f019c4b2b9b52ef0f1377e16a,2025-03-21T14:15:17.523000
CVE-2025-30123,0,0,2971729320ad92fd03f998696461ed7cc92e08495aa1f702cd91222eaa49f43d,2025-03-21T18:15:39.737000
CVE-2025-3013,0,0,2510a4bfa4128f19ce6014fbf27f574c71d4567996b6fa0082d5c4fc5dc4cae3,2025-04-01T20:26:30.593000
CVE-2025-30131,1,1,b1d711e5bc5a7f8880f2541968e1014cbf97c89343c6d4d34427146d26bf6218,2025-06-26T17:15:30.743000
CVE-2025-30132,0,0,6dd8c4b2ac9edac69820a35ebc388d786aab74afcd8113c3b2124d47b6d5313e,2025-03-21T14:15:17.687000
CVE-2025-30137,0,0,098aef1c3a2b56ae0bd3f7cd4c3ba2daa5151c1c497ad5404ed49f32de8e9e0d,2025-03-25T17:16:24.817000
CVE-2025-30138,0,0,83aa1d57612a741bf6f8d83571e5eab154debd0cec6fc852bdac2ca81686a43b,2025-03-25T17:16:25.520000
@ -293724,6 +293726,14 @@ CVE-2025-34039,0,0,33065581e59fb510332e7c56f1b2c71b818ba8cafc063bc369ac3087f87d0
CVE-2025-3404,0,0,3995b7b57c7d03bbf3188d8b6d9621100ea7b4d3b13f0d6dea5824ed5e0cab26,2025-04-21T14:23:45.950000
CVE-2025-34040,0,0,ab246a583bbce961c122b7ec2fd5e7d841d24372c199b5859888943ef451ba8c,2025-06-24T02:15:22.673000
CVE-2025-34041,0,0,e333513a767b39341f0e963179ee4f68eb159feea05cdd92f7bde27fcf9c7f8e,2025-06-24T02:15:22.820000
CVE-2025-34042,1,1,d20727cc5b2bb0c6eafe3acf0e9b3010f1e115ce6353a40e1b67ca9e0345f947,2025-06-26T16:15:27.197000
CVE-2025-34043,1,1,2d52dc77b648f719e27a78df4526fabfd1605635b55d1e414e3a580581822b47,2025-06-26T16:15:27.490000
CVE-2025-34044,1,1,61b0d8cbede6c09108fbcf061fbd9b1e1b1033a09b76a5ddb42e6f0c6ebb1cbf,2025-06-26T16:15:27.670000
CVE-2025-34045,1,1,bdffae3e20819f31c6479e777ee416fa283252727997eafa39503deb0035979c,2025-06-26T16:15:27.830000
CVE-2025-34046,1,1,a89bf47e439d8bac18bdb4fc3ea0a63a7d36ebf35b34b383c0d58e384233425a,2025-06-26T16:15:27.987000
CVE-2025-34047,1,1,61599c27ad1cedde5912fc00280e94b8abdd593a18efcdf70850d91f3531b35b,2025-06-26T16:15:28.140000
CVE-2025-34048,1,1,a99314b47e1847b71167564fe1b15301e09472e3491da33d720fb72f3599e9b1,2025-06-26T16:15:28.273000
CVE-2025-34049,1,1,695487e5839753bec655c0e5b29d345d03fbf9083f010851dd27893be026d554,2025-06-26T16:15:28.413000
CVE-2025-3405,0,0,a31287bf487edd9888ccf3a2cc660111ad412bcd7d306362616791fdc35de9e0,2025-04-08T18:13:53.347000
CVE-2025-3406,0,0,7ba1ebe9a4174ed6e20c2f4fe1e75a4864d330055141a3dcb596eb92ec7fbc3a,2025-04-08T18:13:53.347000
CVE-2025-3407,0,0,e5cceac7b7d945db6bab90635fdc2ec04fc23eea7f5eaa5ff6a3dce8910502a2,2025-04-08T18:13:53.347000
@ -293920,6 +293930,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000
CVE-2025-36034,1,1,8ee05398fa6f54dc6754d1c9d8d0e677baeba0ca01e3ed805653c53e6b9b6357,2025-06-26T16:15:28.567000
CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000
CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000
CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000
@ -295601,6 +295612,7 @@ CVE-2025-4412,0,0,8c8c59397117a84a167d36fb79f68c5cd99b79261327a1fb082cf24faee6cc
CVE-2025-4413,0,0,61cf4ae74dd1877b470f2b4f5c2f8b7d6825e0d478eed1e554284b17cfa549ed,2025-06-18T13:46:52.973000
CVE-2025-44134,0,0,45b85d904dd860695476948041d246707a0696d9dc7fe9b405a5e27a85d44980,2025-05-14T13:05:17.200000
CVE-2025-44135,0,0,e8d32c865e9ccdb8b63503c21fad4c48843876d5709a3df063410109f034ccc9,2025-05-14T13:04:58.830000
CVE-2025-44141,1,1,ca0cd04b4ca59a878409a8ee6c555ba0b1691a170664d5f0e68e827cddde592d,2025-06-26T16:15:28.753000
CVE-2025-44148,0,0,440749a71814d76edeed70dd30fc58f3e0b75eaee931968ee8c88b7d1e24e11d,2025-06-09T18:04:33.580000
CVE-2025-4415,0,0,14ae76cc14cb7c5f3c4c963406f20e07ac9834ebdb3d6a3c4d84f73bfd11e915,2025-05-21T20:24:58.133000
CVE-2025-4416,0,0,a5c38ae8bb1fb36b46a6d4b035c3955bb8e9a586409097b52f155ce641ec588f,2025-05-21T20:24:58.133000
@ -295621,7 +295633,7 @@ CVE-2025-44192,0,0,bbf878f3192590ae7f65b7dd525822e7ec5ccf80ca743afb76c106db31235
CVE-2025-44193,0,0,7a2f77bbf3da9e372539ce2d9568faa612514d106c676666f4f9e9bb49dd4d4d,2025-05-12T19:42:08.603000
CVE-2025-44194,0,0,16480af03700c5c401cb85fd0d61e2e08efda510d573cd95f20458628d42434d,2025-05-12T19:41:14.840000
CVE-2025-4420,0,0,482e6cb0127b5cd1381f571129f0abb13f48f8e0b486724260c2eec90487cec8,2025-06-04T14:54:33.783000
CVE-2025-44203,0,1,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000
CVE-2025-44203,0,0,986e2440b0483edc0c039355181e2e90648cd0645cc8cf4d5602b1543eba4d43,2025-06-20T16:15:28.700000
CVE-2025-44206,0,0,bcf8c43764d9f23abe08370a8241183b1c8b3a14693e972a7012ad0743e79f9c,2025-06-25T17:15:37.740000
CVE-2025-4427,0,0,a2f798eeedafecbd9cb912f610af162690a80cf4bdd1bef66f3124ee4670723f,2025-05-21T18:45:49.493000
CVE-2025-4428,0,0,9005850fdd231a6f5e460fd5ca5842b016cbe5e1aed7fc3fa752cdd9cc20f3cb,2025-05-21T18:45:24.800000
@ -295848,7 +295860,7 @@ CVE-2025-45513,0,0,75d2d23377bdf3eb34768546535e2634c77460ec9fb3e1dbc5e6d7c5335e2
CVE-2025-45514,0,0,a0097e631e2f67ebed1594ab343f4868011705c17a9a818d4cf23fb2040b09ab,2025-05-27T14:22:03.193000
CVE-2025-4552,0,0,78d43dd6fb452cd4c88c9ba8880aef53f1ef01b609cdfafec2c65ebbd9c2ca4a,2025-05-12T17:32:32.760000
CVE-2025-45525,0,0,d964bbfa3565b6e3c8c91f8b1ef6cff3eca96639573f7a1a53ee29de90662ea9,2025-06-20T12:15:21.780000
CVE-2025-45526,0,0,f72eeed659a8027250b12d631897056fbfbfe8e6b44f159bff91751ee9f25441,2025-06-18T19:15:21.853000
CVE-2025-45526,0,1,7c332e0ac82e00dd31b05e654cf89202b648251ee9903ffd3830e5fdc6c807ef,2025-06-26T16:15:29.013000
CVE-2025-45529,0,0,e167386bb5394c534585ea5a04f1a046eac90f4928a6eeb5d60ef274f5e67c1c,2025-05-28T15:01:30.720000
CVE-2025-4553,0,0,cc42244e3fcc3fa0e4735902b7107755da4e8cf945b2a43e81a0e7fb4c007005,2025-05-16T17:08:50.060000
CVE-2025-4554,0,0,689d20479ad000d274d22e94958c98af69dd587a0aebcdb180b3f5df25fbdcf6,2025-05-16T17:05:01.380000
@ -295892,7 +295904,7 @@ CVE-2025-45755,0,0,6fe3262fee3e82261947590b30e342c111c5db410776b66947644241532cf
CVE-2025-4577,0,0,599a2191d82490cb2917b4663991020a6f76d4cef5dcfc1bbad5bfcf594df4d0,2025-06-12T16:06:39.330000
CVE-2025-45779,0,0,7069f589f242601716458d7b26f08f6a87931010ba7c496f215f47c502ef806f,2025-06-13T13:40:52.883000
CVE-2025-4578,0,0,8451b1c03045c8ad3abf8c71774c6b63bc79023720225fdd15b30152793b6197,2025-06-04T20:07:45.857000
CVE-2025-45784,0,1,d8ad263e5f9bc49f0f9e802fa5a7f8d025670a1aece36310e302714153cfafa9,2025-06-18T15:15:26.710000
CVE-2025-45784,0,1,1183046d89fba1b8e7cc428e6740142c348eab38c81fc9b0368caaa8610e4183,2025-06-26T15:54:43.523000
CVE-2025-45786,0,0,7a0ba9ce4206224a5dbcb3a3da9e1372f377164d0fd2610cb24fccae3b269758,2025-06-23T20:16:59.783000
CVE-2025-45787,0,0,839c7946d0f8e2e3f388e984cf0b3d259f804d96030c23335dfd861ac831e334,2025-05-16T15:38:25.723000
CVE-2025-45788,0,0,d9b27095f0d050912ccc839258566df73a65f9582f737413f53a8385c0736d6f,2025-05-16T15:38:16.100000
@ -295936,7 +295948,7 @@ CVE-2025-45880,0,0,3705fe6fc368f2fbd94d197728c7493a9d3bdf0bf25c0a8940fe6c0fa1b87
CVE-2025-45885,0,0,79234899966b4c8a321aa6153cf77a765f29e557be9d26ad86dc78b3a7557cf5,2025-05-28T13:40:22.817000
CVE-2025-45887,0,0,fb1a15240343f864311f44360980a2f79927e76ee0105844e8c76acb00550c58,2025-06-12T16:39:34.730000
CVE-2025-4589,0,0,bb26d22fcf596d77e370296c8ae93489013c99f636d3a8cff9546409ae0197a5,2025-05-16T14:43:26.160000
CVE-2025-45890,0,1,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000
CVE-2025-45890,0,0,3a22354013b73314b78077c7b74cb64483d104ae4e83a7c5b965ccaeb3feca9c,2025-06-20T16:15:29.240000
CVE-2025-4590,0,0,1338bc68ec3d6917d4ad238b5739bcbca3832b2475d3a347918656638fb549e4,2025-06-02T17:32:17.397000
CVE-2025-4591,0,0,09b633064167908f2267d3dc13a3052b782cbd19249bba4734b3313b4950008b,2025-05-16T14:43:26.160000
CVE-2025-4592,0,0,5d60bfef7beec0930ab89b7223857faa5fedaa5c280d844c7ee57c05bd2708bf,2025-06-16T12:32:18.840000
@ -295971,16 +295983,16 @@ CVE-2025-46080,0,0,e77557f865cb8f0c8a7b01f1f6fbdee1ca66bad8ebda2925b71b207a25112
CVE-2025-46096,0,0,e46e913b0fe20a27c7a6297a3680c5637edd7add55053ff1310b775a32e2d62b,2025-06-23T14:08:37.750000
CVE-2025-4610,0,0,d61d953fe0fd6f0d2b21233839836df5133468380db75b47c2a05d78020b6b82,2025-05-19T13:35:20.460000
CVE-2025-46101,0,0,8eb61ce0bd76c46c5a0ea5520ca1a03eea4acd2a3190f70aab698ce7c6299593,2025-06-24T16:15:28.403000
CVE-2025-46109,0,1,0e100313151bd857873e539dccfe6f03c22b3a7f3ec7c82f464e42ce5a0237b5,2025-06-18T16:15:27.607000
CVE-2025-46109,0,1,a81953cf13c139be94a1c266dfcc581a11077f2b3187b5b6aa057caceb5c0bbc,2025-06-26T15:51:06.490000
CVE-2025-4611,0,0,551957ca30c77144066c2501102cbe8b5cc59e5d0e8959ef20d14b731299a950,2025-05-21T20:24:58.133000
CVE-2025-4613,0,0,f577ead831948daefe1272603bfaf0609f1e849af3f425f017bfac9ead135854,2025-06-12T16:06:20.180000
CVE-2025-46154,0,0,28136877062a9fbae66fc92d86286e5d62e1cd8a9e62fd05c5a06eb514bf383d,2025-06-09T18:06:28.423000
CVE-2025-46157,0,1,e45c9755c0a2abbf93a7d97959a5d3bb221d20d255b6e42a5c09cf764b4e1fde,2025-06-18T14:15:44.687000
CVE-2025-46158,0,0,3bb20fd037af8bfa0079f7a48d7ffdaebb00525fc8dd8a5c624354cb5d1cc754,2025-06-23T20:16:21.633000
CVE-2025-46157,0,1,15ef5f092148ce037ce48bb6f5f34f7194730ff07b7e1a3244e0e823362d2bc8,2025-06-26T15:53:12.230000
CVE-2025-46158,0,1,496021feb7f909223ea58ad77cd1644e57cf02b0d8b0ef3c8c84068942351766,2025-06-26T16:15:30.733000
CVE-2025-46173,0,0,4405d31e0bbca77b9a85dba04df7d6cbed12d0763cfb8e942421606ded04a3cf,2025-06-10T15:12:53.720000
CVE-2025-46176,0,0,4ad29bbeee58de7eb7d271c0fb79c01a588d38da2dcbe15f5042a3054d2345a5,2025-06-03T15:47:26.543000
CVE-2025-46178,0,0,91c6404535de808aefa017d6b4ebfff23f380aedc9da42e3620cbfea00da5246,2025-06-12T16:06:47.857000
CVE-2025-46179,0,1,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000
CVE-2025-46179,0,0,1e9fb24c75699a26b4ed9a93c6adcfe246aa8bd706709f527d2af0a4d885ad58,2025-06-20T15:15:20.860000
CVE-2025-46188,0,0,1f058d9f060b53aea2c6bd942ff17e7f4fc325ea6eb31f01c661d2a700e76c55,2025-05-22T19:03:17.713000
CVE-2025-46189,0,0,deb091a7b16f83dfae0adf87dba814de45a16152802aa3583ba953e5461c909b,2025-05-22T19:01:31.820000
CVE-2025-46190,0,0,49ae57538389712e46bb1f8218d4d6fdb9fc8500296b0c348e5059e767ffc2b0,2025-05-22T18:51:35.560000
@ -297588,9 +297600,9 @@ CVE-2025-48918,0,0,96bed736df52792450e3608cc07a547f9c416534292e707cd90567bb1e330
CVE-2025-48919,0,0,b13f4700030161c8cea02111785c6dde091bc79546f3b93073b1eb28b1babf2b,2025-06-16T12:32:18.840000
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
CVE-2025-48920,0,0,c443e19ac648bfe69c31e79bc1998d46349e50d790bd54c32a87884332343dbc,2025-06-16T12:32:18.840000
CVE-2025-48921,1,1,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000
CVE-2025-48922,1,1,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000
CVE-2025-48923,1,1,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000
CVE-2025-48921,0,0,60108674aa9da19d1b7091b595c8ed40f7a1d94323589c6d910996093bab2cc9,2025-06-26T14:15:30.043000
CVE-2025-48922,0,0,7a5047668d334930881e2b457606985ec361c1d853d924c02455f87edd193b7e,2025-06-26T14:15:30.180000
CVE-2025-48923,0,0,1fa4ea82497ce4c558f5cb0484eb2951b14a350e9b4f9f4f35aab01f62adb054,2025-06-26T14:15:30.300000
CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000
CVE-2025-48926,0,0,7c30f38d95fc987bd6e8852b968a55a7e51032b7c79b54853568428b8d32ecb1,2025-05-29T14:29:50.247000
CVE-2025-48927,0,0,709ff3b5cba6df23c4ebbabd98b2844e61f0bb8547f17efd794502cb0ceeec47,2025-05-29T14:29:50.247000
@ -297647,7 +297659,7 @@ CVE-2025-4900,0,0,a63cc638a24f84eec22901c973a40410ae17057cc7bae6578e39029782b2ee
CVE-2025-49000,0,0,f8cce1a2bdee8bde170fefa186e3e45152457ed27acc2f9d05d9f849c91c807b,2025-06-04T14:54:33.783000
CVE-2025-49001,0,0,8dc4548fe390fc22a5faf69cde327e5fe5b96046e91fdc466cb08c1aca094302,2025-06-05T14:07:47.397000
CVE-2025-49002,0,0,216cade8987f40e7e1bae00fef99c6cc70caf989f13acf7e248d90eb2faa16c6,2025-06-05T14:07:36.847000
CVE-2025-49003,1,1,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000
CVE-2025-49003,0,0,6d872892fd4df39d0f411338678fc504959c64f83cc9150d4c7ae1cc0dc9727d,2025-06-26T15:15:22.963000
CVE-2025-49004,0,0,89d47ac006a07f0278b924493f5a5a2553c688202c5da141c2c812c60b3a1cb1,2025-06-12T16:06:47.857000
CVE-2025-49006,0,0,69cfb489d390e5afe2e42023086b2832eeed6d765863e99bd3de00a5d46a4fa7,2025-06-12T16:06:47.857000
CVE-2025-49007,0,0,d1c6d78f4ed2af74dee6497de444888fe48e0c945fb3e3b2be2f74b557cd31b9,2025-06-05T20:12:23.777000
@ -298162,6 +298174,7 @@ CVE-2025-5033,0,0,06c9afb9196a99dd4f0b3020a989f4b3254b2b9e05cd3f3304d140aa64b94a
CVE-2025-5034,0,0,32c24ba6ccd75156344e37a326a475bfa55837c0e754ff953557111ff3de4bc2,2025-06-23T20:16:21.633000
CVE-2025-50348,0,0,5081ba7593ae8342ef6e03ff05001a5e9251f0737e546d04330fd65ae4fb2e2a,2025-06-25T13:08:13.867000
CVE-2025-50349,0,0,15e0e70949273fa56afdfb5bd13043f639cdede12bd48e56cc46a914f6d4ad3a,2025-06-25T13:01:11.240000
CVE-2025-50350,1,1,5cd3d30f7068da80d0dc38eff27e468cefa8ec3f83bc60e37e01ddd3f4cbf5de,2025-06-26T16:15:30.980000
CVE-2025-5036,0,0,c38e53ab36341883513f1bc0436ec7cb62abd108008baba46460fded702f863e,2025-06-02T18:15:24.783000
CVE-2025-5049,0,0,44cfcf3aff795ef24e83417940f428248f6dbe73d228a2445e4d18a251d64c21,2025-06-23T14:51:34.223000
CVE-2025-5050,0,0,18c722bc6b5f548b69eef0fffd3878fac15ddedca7de625378de12e31e056210,2025-06-23T14:51:31.630000
@ -298264,7 +298277,8 @@ CVE-2025-5164,0,0,228da27fe94094da78c818ea5e2c1e5953ef9870e1a7763a1facd97f4dd57f
CVE-2025-5165,0,0,b944072ac0091ca469e0b415fb7abdf162d341970b7082fcfaff9d04957c85a4,2025-06-03T15:40:01.863000
CVE-2025-5166,0,0,c51ae421fabf1219a3900c58419bdaa5117f65f9603b27137cff53c0e0d61b00,2025-06-03T15:40:15.497000
CVE-2025-5167,0,0,d0507ecf0b5b21e24f107649f2515c6afbb660790e07751f18cd594dd93f34bc,2025-06-03T15:40:34.607000
CVE-2025-51672,1,1,64d1bb8cff829221eb90bfd1173e0c4255b40a8e40cd3f00bb2e2708ccd14132,2025-06-26T15:15:23.140000
CVE-2025-51671,1,1,3e71586572ea65b47e25c56ef10a036b0c05a5900a3ee3e329b1f54be8d8c9c1,2025-06-26T16:15:31.147000
CVE-2025-51672,0,1,1bc0234a905d224e3d492d4ebb2a0117a74c9cce1645deaf0a5468c16d68de52,2025-06-26T16:15:31.347000
CVE-2025-5168,0,0,74f02a822faaa8b5a46a78e41282b22e771403dfc5a44608e54bea89178ff6fe,2025-06-03T15:40:48.337000
CVE-2025-5169,0,0,478bfc131e88e29d02dd1ccd61a9e6c142c0208ac4743abe27cdac119eac9f7b,2025-06-03T15:41:01.973000
CVE-2025-5170,0,0,2d3c44ad97f24506915e1ae8aa2894c6137b30f378f725193e8dabaa89f599c6,2025-06-03T15:41:52.177000
@ -298298,7 +298312,7 @@ CVE-2025-5205,0,0,4e2cf941cdcf5c4895f1e6095123f642f58566d13011fecdf14fc65595d0e6
CVE-2025-5206,0,0,feed10da244a1180a12944193b9a34afaab380339e02b711b6b86c10a65dd729,2025-06-05T14:14:49.180000
CVE-2025-5207,0,0,e402cb7000c0d3ec5faf704526317d521bb7be7fab48c7474536b7fb38ce6981,2025-06-05T14:14:30.010000
CVE-2025-5208,0,0,9e9535cfb50c25096d995fee715ad33ab744750f67296c60cac7b3a386d28ef1,2025-06-05T14:14:06.397000
CVE-2025-5209,0,0,8bf17c054f37888c321563ea5fff8f80a6eb5146a899768828b942498237d5fe,2025-06-17T20:50:23.507000
CVE-2025-5209,0,1,1de988bb6fc9688228254af9049355449ffefba36f51df5a462735aed22ede34,2025-06-26T16:01:40.640000
CVE-2025-5210,0,0,7f798974cbc440c4e4dd8009e513c3eb9007b33b9ead67a41eab0bd81192fbbf,2025-06-05T14:13:54.527000
CVE-2025-5211,0,0,8f4ed9a6be734738ba7e8af34dfd90276884a544fade7898e9f11540d4e9c7c6,2025-06-05T14:13:12.777000
CVE-2025-5212,0,0,09bde77c0a73fbc6c1f35bedb61d3c4c409f9d9416e30903b1d4777f1733a256,2025-06-05T14:12:55.247000
@ -298347,6 +298361,7 @@ CVE-2025-52467,0,0,16105c9074c96ad94abfdf299814ac8afdc45b40f5844eda614417a0d3d4c
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
CVE-2025-52471,0,0,0c62d382ed0af363c08f042f130801cb12a4f00ca1898ecf3fe6d67ae2476ac6,2025-06-24T20:15:26.033000
CVE-2025-52474,0,0,85659b730b44219986935e49453dd6cf44bae5c711fd564545190739032f0da6,2025-06-23T20:16:59.783000
CVE-2025-52477,1,1,e07378f4d27997f6acd49a22f94ad2426dee743f2043ef8c0d7e90c5eb6640db,2025-06-26T17:15:30.897000
CVE-2025-52479,0,0,c2fb883dab9af3bda17257faea1540c97a64f864f363f43f9aac347719c31a58,2025-06-25T16:15:27.017000
CVE-2025-5248,0,0,cb74e13c3a661382a173d2171f53e905ac7962a17d411318369a81c1a4c9d649,2025-06-10T15:12:22.573000
CVE-2025-52480,0,0,9058ad9c4f4d9cf4adc8bc18d88405dbdd03cfd1af621ce6c0bb86ccfe2ced26,2025-06-25T17:15:38.590000
@ -298377,7 +298392,7 @@ CVE-2025-5257,0,0,75d358e3d2bbe3761b44e1bc4ce97e0b1726e1521e4fab98ee61ac2e91cdcf
CVE-2025-52570,0,0,b69e7827dc71b47cbfc70d06c560ede1e01f1eed518d271e063fa0ddf9df6ff5,2025-06-24T04:15:50.360000
CVE-2025-52571,0,0,93605af77865e4b4bbd8aa8df37b6227ed19cbe7c36e4563dfbf22f7ad6141df,2025-06-24T20:15:26.213000
CVE-2025-52572,0,0,c9098d5ca2a634c2c4a58c403cfc6222ba614b823936e2401333651171589a19,2025-06-24T21:15:25.463000
CVE-2025-52573,1,1,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000
CVE-2025-52573,0,0,45796b9039d24b9a3eda334ce45b25e7e4892eb3f5a75cc205d2727ac54b744b,2025-06-26T14:15:30.577000
CVE-2025-52574,0,0,b834c56f84ab539ad46a50792bcb4b20f0358336a46771bcdc0160c6c5c64451,2025-06-24T03:15:34.797000
CVE-2025-52576,0,0,54ca2c256007cfab31d182d53578f909d2f84aab8167fde4bfa01ad557b852cc,2025-06-25T18:15:22.537000
CVE-2025-5258,0,0,fb6007864f0f198afc07f9e5f2cd9992c3bc7deee34ac7dac8830ce62da80bc3,2025-06-24T08:15:24.397000
@ -298441,7 +298456,7 @@ CVE-2025-52880,0,0,9cb07f316e3d88e0df580ddbed7ea9b43e79f625bd4ca243674ed28fb6c24
CVE-2025-52882,0,0,1202797e512191e9de7b995f3a96465f7bfc2ed3174a803e0c7dd48572c30229,2025-06-24T20:15:26.543000
CVE-2025-52883,0,0,94a59b16d2725ff940e9d9c5d66af8696ae28208bd1cc6d6422de88432398bcc,2025-06-24T21:15:26.030000
CVE-2025-52884,0,0,111efc59963d9cf24b8cfd776de05a966fe0af3c7a58d02e676305ff800577c2,2025-06-24T21:15:26.207000
CVE-2025-52887,1,1,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000
CVE-2025-52887,0,0,1b1934b1ff0f584f251ffd339ac8ae7cc59d8fb82a7344dfd94d51d04ab35793,2025-06-26T15:15:23.350000
CVE-2025-52888,0,0,3d1af33939cf7d42fdad330956d26c92022bdd0439ccab86c4344f860a5a72bc,2025-06-24T20:15:26.700000
CVE-2025-52889,0,0,9da61724b301758b81e861d135c2b4f87c1d9193c45f2d7ba9df9323c5b8a14a,2025-06-25T18:15:22.653000
CVE-2025-5289,0,0,7c7a7fd94b9e27905a1cadcd118b0b2af6a175d504b657fe651e510f41cabc00,2025-06-23T20:16:21.633000
@ -298449,8 +298464,8 @@ CVE-2025-52890,0,0,21f05b9dc7685c75ed3a78bf53cc0622eed7e0158a3757e7d2757bba0471e
CVE-2025-52893,0,0,fde8c69e5dfb177b45c8843696effb13dc55e52e52a7f13d69ef2cf3a5264867,2025-06-25T17:15:39.523000
CVE-2025-52894,0,0,86c1ea7749bd2ac6272c7b237f4f0745b29d5d1222611ddfdb5e5bdeb4764540,2025-06-25T17:15:39.677000
CVE-2025-5290,0,0,ad45f62f849dd27deb380b44d26b94809d4f0499166fbd95cf7b52d6d8099374,2025-06-02T17:32:17.397000
CVE-2025-52900,1,1,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000
CVE-2025-52902,1,1,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000
CVE-2025-52900,0,0,c5c483edb4b5cd5d587284cd43f3e048c5fac4dcd7c164812dc6bcc063dba44c,2025-06-26T15:15:23.520000
CVE-2025-52902,0,0,ba0957095b9b497f96459df71ff00fe93cee82677e7b9be6aedce9789f09da30,2025-06-26T15:15:23.687000
CVE-2025-5291,0,0,30fc605f4380fb7e9cd3dc4c3c29792847dcfc90b0ea5fa3ca9a29d145a853dc,2025-06-17T20:50:23.507000
CVE-2025-52916,0,0,aaaed48e0f18bf7221f6e78c081756a27d5cc78db64cc6bd43ff354b6dcf72ac,2025-06-23T20:16:21.633000
CVE-2025-52917,0,0,2c681ba1c2eaadda0232ca155b7a07de3998b80dd04ae3c39bb2c896cba07a42,2025-06-23T20:16:21.633000
@ -298485,8 +298500,8 @@ CVE-2025-52979,0,0,52505f03c11370107b014986dc0342ab4c8462260c5f831736e7ef7e18fd3
CVE-2025-5298,0,0,db5fe80cdf57c0cc24fb51e7a48139d5b1b81a3a48561037cf1b32b8be34d74f,2025-05-28T20:37:48.440000
CVE-2025-5299,0,0,1f89fdfea84380ce22c226fdfd1b89a6ae1b920a9c80e662b58b6ab3dafee162,2025-06-10T15:46:55.753000
CVE-2025-52999,0,0,8a6973aa5c242bcc72c2aa1d3ea8125d3c697581af3172eff6b5e1b688b524fb,2025-06-25T17:15:39.820000
CVE-2025-53002,1,1,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000
CVE-2025-53007,1,1,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000
CVE-2025-53002,0,0,3d69344d128cf8e6eba45391a732f0f15c3f4b3fd0c2794df181a207042522e3,2025-06-26T15:15:23.873000
CVE-2025-53007,0,0,2141606fce0283ce971232c003b310c482d4ee9ab26eb96012fd96c997a705a2,2025-06-26T15:15:24.043000
CVE-2025-5301,0,0,172c3938c2a9928b9f8edd9f7241e7981b7b3a36108e0e0149558a51f65a1594,2025-06-18T05:15:50.287000
CVE-2025-53021,0,0,f00c7a7e87b168adf26db9622068d05e126e48777cea689658514ba01dbc3fdf,2025-06-24T20:15:26.867000
CVE-2025-5303,0,0,546057fa156dd0bfd15529f37c8ab9dae75346583c1c67316386c3461de42474,2025-06-09T12:15:47.880000
@ -298783,7 +298798,7 @@ CVE-2025-5676,0,0,1ca2c49bb4d510b5740938a869bb2d11a6220d1957dff2d9f9653e2673322f
CVE-2025-5677,0,0,364b4a61489a27818eacb60d1e1f6c17d4c2d09e9d81b672d48b3e04da11ebb6,2025-06-10T19:31:37.290000
CVE-2025-5679,0,0,39a76065dd3011f556df8ecc5c1607529488c249cbea269aa42dbb97296654d5,2025-06-05T20:12:23.777000
CVE-2025-5680,0,0,951e9727eb6f85cb1826e5addda531b5a3ed92e200dcd69a9572852fb51b7dd6,2025-06-06T14:07:28.330000
CVE-2025-5682,1,1,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000
CVE-2025-5682,0,0,4d46e61991b0a8d86404415b7a96b5fc7e62533e3aaf1ba49adc7537bb8ebbe3,2025-06-26T14:15:31.280000
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
CVE-2025-5685,0,0,9300f7d7685cfc359ac44cb8501f97431249edd5f4608a9c2df4c4def6573138,2025-06-10T15:01:39.320000
CVE-2025-5686,0,0,ceecb4c8c9b6240c3c4cf6461703c0b505d1b9b8eeadd71aabaf7a72390230d4,2025-06-06T14:07:28.330000
@ -299090,12 +299105,12 @@ CVE-2025-6130,0,0,cb569be39f5f1da076d06669e0896e22c8cd60dff8ebc57d155295bc5acb6c
CVE-2025-6131,0,0,2866309ab3a411ed34af4bfc174dd80cc2f38df6ce0809f56ec34a44e1386fa4,2025-06-17T20:50:23.507000
CVE-2025-6132,0,0,4820b926dce549d59ace28c44f962f1b682b6ad27fe3050ad7fcb6e14d23357a,2025-06-17T20:50:23.507000
CVE-2025-6133,0,0,e8ce544a9effd7cb8b54da22c642c5245af611c0276c41dc8559e4d5a610718a,2025-06-24T19:44:40.803000
CVE-2025-6134,0,0,e314e671c8bc5848fa55335e6580660a169004bde35b809cd5c9e61560c3067a,2025-06-17T20:50:23.507000
CVE-2025-6135,0,0,ee51cf2c4222bfb9ad2c176fca2a379a43397e990b2eb061f92b5c8b5b0a323a,2025-06-17T20:50:23.507000
CVE-2025-6136,0,0,e9caa20ba8500c81ebc641ee6a945f6f003a8d2240dcf3f113058eaffabd98de,2025-06-17T20:50:23.507000
CVE-2025-6137,0,0,61118b7323f6830919ef7135da4ecd957265d06148eafb09448f3d4e9c68092c,2025-06-17T20:50:23.507000
CVE-2025-6134,0,1,8a23584764f618ffd2d4995a9b4d16e5d5cdabc35d0090302e1cb1d8481cb193,2025-06-26T16:46:43.547000
CVE-2025-6135,0,1,506099148e534a57e74eec0360b5146bb6d16f5700b5c048c16b15d25659f5e9,2025-06-26T16:44:08.650000
CVE-2025-6136,0,1,5f7e8be2da42633353469049b7512fa5d07106f6da9174f3722e62acbd430a92,2025-06-26T16:37:17.293000
CVE-2025-6137,0,1,ddc67afa546c83e767dcbbc7b7e064e9742a4bea6b7f9760a6f55350f1985699,2025-06-26T16:33:18.123000
CVE-2025-6138,0,0,69c19eff97e06c34f5b8cfdfba9cb33f9498a49d64177b5418e8373bd3e2dbbf,2025-06-20T14:34:32.397000
CVE-2025-6139,0,0,a963e3b0573264a9167c8ed8cca13c432a733696dfe2f1dd43cd1680a94578bf,2025-06-17T20:50:23.507000
CVE-2025-6139,0,1,1e573675182fd2c70c93e9d60e690c79091588fc0dffcb1bdf91b56cec3b2b4c,2025-06-26T16:27:37.157000
CVE-2025-6140,0,0,90c8d7894599b8728f992434ba3431a19d89cc26541cb2e9752a70dfc43adc3f,2025-06-17T20:50:23.507000
CVE-2025-6141,0,0,da13bc3db5b6441ec02280dd31d41a049dec0de80cbb8316bf3d83796a9c0f04,2025-06-17T20:50:23.507000
CVE-2025-6142,0,0,e80f42b3df69bc7d34694aade5534d0147faa50d387373f1d151bcbe4aa458f3,2025-06-17T20:50:23.507000
@ -299115,9 +299130,9 @@ CVE-2025-6155,0,0,3e8fc69cbf51a07d93c7df9f9e6e4b66e36cc96b90ecd10cbf6a0ab1b9592e
CVE-2025-6156,0,0,50bad226a589479fea329c4b9ea16aa953872a48df791a98c47ba27f5989fe25,2025-06-24T15:52:28.587000
CVE-2025-6157,0,0,180c03ace223f2bdc4a4810f873bfe6ccf5f7edb279d8977a5782cbd3224fa72,2025-06-24T15:52:26.320000
CVE-2025-6158,0,0,2f36d74bb802a051d651546127c3dc725b5baddaf659643b5bacdd29188892d6,2025-06-17T20:50:23.507000
CVE-2025-6159,0,0,38e8ac5e5294c42b259b82c8daef65af0d7b30e502051f62b250d30a5a031545,2025-06-17T20:50:23.507000
CVE-2025-6160,0,0,ade16d050fe213428b173ad29429dde198ba45d3ed2aa7e95b41154f41eeda9d,2025-06-17T20:50:23.507000
CVE-2025-6161,0,0,eef177824c88350da4912eea2cf199bbbd914eebd1a4811f8e4dddf4e232cff7,2025-06-17T20:50:23.507000
CVE-2025-6159,0,1,b6654ae04ca00ebe3d5ed69f1af3600e83fc73919e57aba07df0f12e772f5196,2025-06-26T16:21:06.720000
CVE-2025-6160,0,1,5ffd3a5dc242cfd1fecdd7fd3e437c972a4776d68b464499becd18bc1698dcb4,2025-06-26T16:15:47.617000
CVE-2025-6161,0,1,0e873c05638bc7fdac845123aea4c5a97ffb7356cc08e5c74933eb0b81f079d0,2025-06-26T16:04:27.483000
CVE-2025-6162,0,0,e84675b06fecb8413603d644d7dc1a9c194bceeff6262adb1f964a4383ba4305,2025-06-23T19:20:50.197000
CVE-2025-6163,0,0,6e13a9e163cb9e3184563f5c7b63b8596f5e63cf06bd837983ba5aafb4c041ca,2025-06-23T19:11:22.090000
CVE-2025-6164,0,0,c17ffe7ec702387ad5d177a5e91c7296a9ef4f80a11f6ea499b523afd7af1e02,2025-06-23T19:01:39.440000
@ -299127,7 +299142,7 @@ CVE-2025-6167,0,0,e83c0c1ea86d6b605cd16c602292d01c1e3a7ce00c593e57ae080fcd8bf11e
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
CVE-2025-6170,0,0,b78aff7a1c8e8db8ce7aabd9ccc1b29ff578e0357c573a194099cb12287faea6,2025-06-17T20:50:23.507000
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000
CVE-2025-6173,0,1,9d65cce56e690409faedd082c2e62db2916ca8efaa5a80d53a28792b8de1cc38,2025-06-17T20:50:23.507000
CVE-2025-6173,0,1,c070b1517acd95c5e869ebc2e1f1712fafd19138bea48c0324a49cddfc5a27e5,2025-06-26T15:57:47.900000
CVE-2025-6177,0,0,f708d677d17f57d89176eeab0f542a182dcbda72661cc0eb13a3bc38d1575fd3,2025-06-17T20:50:23.507000
CVE-2025-6179,0,0,ef3e1c0f37267be4950d18366a27dfd0b0e58f054fc3240188e66ee490b59e39,2025-06-17T20:50:23.507000
CVE-2025-6191,0,0,f0f3b688b48f4f8183a91df95fa38ffe0dfc74cf3682559765b5451f2fa22fc1,2025-06-23T20:16:59.783000
@ -299170,15 +299185,15 @@ CVE-2025-6286,0,0,0986e442b62971a42e733069c69f2b535595029d77fbaa4fa93e52b8d99f5a
CVE-2025-6287,0,0,1f0442e805994dfa210a8eb3aa304f70a76a3d031c0d44f5ffd1b0d3dde5756c,2025-06-23T20:16:40.143000
CVE-2025-6288,0,0,9ce149ad42505ec2b4ca64cb24a668e9a7b4bbe84cfa5abc98150f3205f4a2c1,2025-06-23T20:16:40.143000
CVE-2025-6290,0,0,fd5137afaf81f121f32b5fb857c9bd0fbd66061602c501bf3307842726132473,2025-06-26T02:15:22.733000
CVE-2025-6291,0,0,d55175acbacd88914c9be973fe6f91be8167aa92b1c93ae033cdffad235834e1,2025-06-23T20:16:40.143000
CVE-2025-6292,0,0,ff04dbdfad10a3b13607f775be002341c1f09a7a43bda27cdc2a017c4c5d4f1d,2025-06-23T20:16:40.143000
CVE-2025-6293,0,0,51c953c2806e51616f5a3280e43a32ce3c0eb07cbfb8381ded97a6c641ce5cdc,2025-06-23T20:16:40.143000
CVE-2025-6294,0,0,5b3ad9b265c9fd5c11c1726b2df030f0862788c5649c89e9fd5dedb4b770da23,2025-06-23T20:16:40.143000
CVE-2025-6295,0,0,0bd04a66f87e78692ba4dee61309ed11f9c3c7899587e401de1e30ab4b60ad63,2025-06-23T20:16:40.143000
CVE-2025-6291,0,1,dc1a968051b9db85759355228419cc46165b7a6778eb4ff9ec8664745bc75db4,2025-06-26T17:00:25.153000
CVE-2025-6292,0,1,950777517b48d376f4e9cfbb6475ca5763192a729885525f030e7df89973a74b,2025-06-26T17:25:51.993000
CVE-2025-6293,0,1,30342ac281aebc0a30969c59d523a1a3a2cc7a536dbaaadfbb8317c27c072af8,2025-06-26T17:22:14.003000
CVE-2025-6294,0,1,2f20bcf126712080bcfde5ea574f9107db7d0aaac3eeac826f2b5961068819f0,2025-06-26T17:21:26.107000
CVE-2025-6295,0,1,c68657e703a32d8a27635af3bd0cbcf47590717c8db4b4d0b6e9b6fdea795c7c,2025-06-26T17:19:48.817000
CVE-2025-6296,0,0,3199152674d281a8b0bfa9392ec2d741dc87f4294f9f5fd910f569a20facdf65,2025-06-23T20:16:40.143000
CVE-2025-6299,0,0,0c5467d80bc58e4cc48c65f2c08fc824bcbb0be1a5cdf91f595765a0183ebb54,2025-06-23T20:16:40.143000
CVE-2025-6300,0,0,53a28bfc1e73c0675ee7f66dbc37a4105a5dda9c8fc91d61645574e9adb9d26c,2025-06-23T20:16:40.143000
CVE-2025-6301,0,0,0880affa9b0fdf60c148716cf68fa23897d70c14416dd813615fdf9f7c220894,2025-06-23T20:16:40.143000
CVE-2025-6300,0,1,e2ec6cf8b98712d407f84e21f599347de059cbe66e2eb84a9fc4eb6c7fb27268,2025-06-26T17:14:20.587000
CVE-2025-6301,0,1,1a6a37865c9ad16879d590be6f25642d0cfa9abb4a67fa3b3dc503342ed3c79d,2025-06-26T17:09:26.040000
CVE-2025-6302,0,0,e3539c9b5f9b261c59bd1f61e25234e8559a654a63f9c967a1007ae0f4a5c2be,2025-06-23T20:16:40.143000
CVE-2025-6303,0,0,001666194667549d93b9d4329658990f457777439e0228e9bd08f4416d371963,2025-06-23T20:16:40.143000
CVE-2025-6304,0,0,55c7409c08e8bc681802a6630bca19d5a26cc48af50cbcd82a055c7cc06a550e,2025-06-23T20:16:40.143000
@ -299213,14 +299228,14 @@ CVE-2025-6336,0,0,3d3db1672f06ec0712a78cc92696ede18c9e871cf673cd2a145a9a0172e32b
CVE-2025-6337,0,0,161e6a8a3656b81227fce426686a6291bb2989b8708f75a64f2ebb684f913edf,2025-06-23T20:16:40.143000
CVE-2025-6339,0,0,39a93e9b819524c01a5f6335f7f0645f0590e6d2af3e1fa5bf2ca3254fef0d62,2025-06-23T20:16:40.143000
CVE-2025-6340,0,0,bb34cef064dae7650a8fedfe9b945186839c51af4c5b089557f29d1c74de6290,2025-06-23T20:16:40.143000
CVE-2025-6341,0,0,67770d3bee16aefa22be7a7779675d17d597f87fcf7023ade15e713960edc616,2025-06-23T20:16:40.143000
CVE-2025-6342,0,1,5d9d9ecb9d33089ab84260bc82e847bbc6b45d0c5d5a6033667e80e558bbce7a,2025-06-20T14:15:32.260000
CVE-2025-6343,0,1,a1b8aeec96a4bd99be027cf1f3da5d5ab1bbf468484db3d3bde3ced7ee12be8d,2025-06-20T14:15:32.667000
CVE-2025-6344,0,1,eb4eda875caa8d1445f14b88fb0e9bf5ceab8e991408dbaf902ad01031844f8c,2025-06-20T14:15:32.970000
CVE-2025-6345,0,1,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000
CVE-2025-6346,0,1,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000
CVE-2025-6341,0,1,6eb97d536857f3ed3053b28a0b496ad883570be814c5c64c307e1ec4c95a4991,2025-06-26T17:31:18.840000
CVE-2025-6342,0,1,6934fab8f5de2e37566c0bd37708ff4b41608b68048fce7936eae8dbc964dbfb,2025-06-26T15:43:29.243000
CVE-2025-6343,0,1,486d933b030c79ce931ba483ff730af554d03b5f6333e6a7ea67c21e98e6807a,2025-06-26T15:41:01.887000
CVE-2025-6344,0,1,d4ebe8546071c6f599337efb2154e70f6fbd03816d527c4e2779e3b0d262295d,2025-06-26T15:38:17.790000
CVE-2025-6345,0,0,b33f24903860f4767c24c3b23695242ccd8af4a1055fa40f0a8676c27b00f49a,2025-06-20T15:15:35.800000
CVE-2025-6346,0,0,011bc8a262555edab4b20ddcee756fa3b3eb6e2997e406cc2e1d1d0357f55b38,2025-06-20T15:15:35.983000
CVE-2025-6347,0,0,314d9452b387c10ac762b3b1128a41f845645f5c30e1ff2ca81e9f93cc334357,2025-06-23T20:16:21.633000
CVE-2025-6351,0,1,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
CVE-2025-6351,0,0,0b04aaa7d086b3fc46c47903a32227c30f140a645f1c0f92929b974615781879,2025-06-20T16:15:30.250000
CVE-2025-6352,0,0,9d15046a1965b14eb3ab7c9082bc02622d7ca5d63392e4ee8604e05d4ffdeda2,2025-06-26T13:50:10.427000
CVE-2025-6353,0,0,629fe18bcfbf2dd023d18f9e595e887b68dcd365925026ba25f8edb8b1dcbbd9,2025-06-23T20:16:21.633000
CVE-2025-6354,0,0,2e29c14f11a4c0713b5bb333b8bcc3f82a6e68c07f853a1752a2daff23ce8fab,2025-06-26T13:30:17.410000
@ -299229,11 +299244,11 @@ CVE-2025-6356,0,0,761cd0ad99957f2e0c9e007ddb509923b5d31be3535a0aa240f06ebfbe76fe
CVE-2025-6357,0,0,d5588ad4e25e1b2b823de5512a21009640a1b05467799f68a81f2448bf8cd2ab,2025-06-26T13:10:38.540000
CVE-2025-6358,0,0,e3ae463d2ac1773151451d366ab85d1d8dfcdf17ef41453f2202072b1b028458,2025-06-26T13:04:08.447000
CVE-2025-6359,0,0,4c6b3a89015ba9383cd0f30179b8f5c4de98d22d2446e398ba201465b8f64821,2025-06-26T12:59:46.793000
CVE-2025-6360,0,1,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
CVE-2025-6361,0,1,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
CVE-2025-6362,0,1,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
CVE-2025-6360,0,0,cd47aa26c5ecbd48de29b33b9fb52e4ccfc785bed014ddf3d7b77089b3be3045,2025-06-26T15:35:49.490000
CVE-2025-6361,0,0,69dfed4b6ee28f48f4584674801cbba5191a06ac465e39fa526b231064a630aa,2025-06-26T15:33:24.173000
CVE-2025-6362,0,0,ed837364dd32376dc1cfdf8d173bec48f29c4e974fad65f0c43a106ea3f3894b,2025-06-26T15:30:56.573000
CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000
CVE-2025-6364,0,1,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
CVE-2025-6364,0,0,be4a9d9271654f5f2f84bfeb78f337d623dc5f4d4aa408522a8f5cef88e4cf46,2025-06-26T15:28:57.953000
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000
@ -299285,7 +299300,7 @@ CVE-2025-6432,0,0,709154992723f331a52a5ad0200366583cc8c17511eb731f8a67ceaf01c780
CVE-2025-6433,0,0,388a9e3c4ce770334337fb5b365eb81eea0a09dd37d26b543d992df75886bad1,2025-06-25T13:15:26.977000
CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7a5,2025-06-25T15:15:26.313000
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
CVE-2025-6436,0,1,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000
CVE-2025-6436,0,0,64ee87009d3f405effe05016ce18b97f871de07171703adf5abee597ea8e22e5,2025-06-26T14:15:32.083000
CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
CVE-2025-6443,0,0,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000
CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000
@ -299352,7 +299367,7 @@ CVE-2025-6527,0,0,a9a66d6d6a8e0192016e66fcbc4b16654b5cc67da7f8d638e0a1029d3e911b
CVE-2025-6528,0,0,2d8652c6e064cbe08fda9e1243d2cdd94889748bd307dfeccdf2fd9f8f69ecd5,2025-06-23T23:15:23.783000
CVE-2025-6529,0,0,5939d745bd3d487f857a2a174ee40a3eef3cd5f9ed4541420b1ccd8bcf150ec0,2025-06-23T23:15:23.980000
CVE-2025-6530,0,0,639790b7cf36a394013b206f6f5ba1257ba639269bfaa5c6603b3f61857328ca,2025-06-23T23:15:24.177000
CVE-2025-6531,0,1,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000
CVE-2025-6531,0,0,7cbb8659e90d4ef287eaefdc968ecbc80a7b050e0fc89f77f70317cf36b2eee7,2025-06-26T15:15:24.250000
CVE-2025-6532,0,0,86b97cc081ce799f93178d6ecc465a0c60d5e09731b91755b70d7769569024c8,2025-06-25T15:15:26.467000
CVE-2025-6533,0,0,d492ee571eaee5df043f384c635c6ac246fddd4934afdb55035bafe65d55de49,2025-06-25T15:15:26.600000
CVE-2025-6534,0,0,4aaa4dbea2d1e21bce858b4566e1e92b835724c6fd1a3385ad07ba3ba2aacaa6,2025-06-25T13:15:27.137000
@ -299367,8 +299382,8 @@ CVE-2025-6546,0,0,7f4fed601cdb578810dd1a5cedbed6eeb0f6925914143ccccd7f3f890dcfc6
CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad19,2025-06-23T20:16:21.633000
CVE-2025-6551,0,0,28b300bbd8c144f51c63879310dc12af5cc8cc1da1c90b362d6276ed1d7f06a4,2025-06-24T14:15:31.390000
CVE-2025-6552,0,0,803ee4a1ec8be82f7a7266a0e0782f249d6c01547f2c273254ca519cada86f3d,2025-06-24T03:15:35.520000
CVE-2025-6555,0,1,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000
CVE-2025-6556,0,1,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000
CVE-2025-6555,0,0,c8debe65f417be0e5f85471b847c080813527a23bda7bdf471c05f76c2540041,2025-06-26T14:15:32.340000
CVE-2025-6556,0,0,8a19ef2e594f32189105a51bbaa17de7108727340812df93f9f06f6754c5fa04,2025-06-26T14:15:32.510000
CVE-2025-6557,0,0,9c8d24f715ee56ef9d342378028aa791ae3be74b300c390b225046716ecd370d,2025-06-24T21:15:26.697000
CVE-2025-6559,0,0,444ed8a45550b3671771862423149729d25531cb4fc98aee2a01e13a863dcde8,2025-06-24T03:15:35.700000
CVE-2025-6560,0,0,49ff1f0a782ce228cea5686f0cb1a3280168d6abbcd267d809259241cd7f946f,2025-06-24T03:15:35.897000
@ -299403,9 +299418,9 @@ CVE-2025-6616,0,0,69e3d0b87c0a15bcc888ba109078758162c727a166b9e07eb51047379945f9
CVE-2025-6617,0,0,69a437ef6870d59f3c2ba3c010071a735995948d72c1f0a5d65bea12dcb87390,2025-06-25T17:15:40.507000
CVE-2025-6618,0,0,8f0f71c280554a7c818df3f61621fbe8f744cc190f41ed0b491a2c752a76b10a,2025-06-25T18:15:24.757000
CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217cdb,2025-06-25T18:15:24.950000
CVE-2025-6620,0,1,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000
CVE-2025-6621,0,1,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000
CVE-2025-6624,0,1,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000
CVE-2025-6620,0,0,7bc5ee9a6c35175ea4c2d789f1d97faf66ba959a6ed15da7fcebe667d5d906ec,2025-06-26T14:15:32.737000
CVE-2025-6621,0,0,92ee36f9955ed67d57c6c13f2d4643afe1425501effe00183fb5a52fccd6ca0b,2025-06-26T14:15:32.933000
CVE-2025-6624,0,0,07a93b2e9ed3c8caae6323425b398f9c4fc0ffd70646adb166b429f500d00218,2025-06-26T14:15:33.070000
CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000
CVE-2025-6640,0,0,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000
CVE-2025-6641,0,0,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000
@ -299435,19 +299450,23 @@ CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf6
CVE-2025-6667,0,0,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000
CVE-2025-6668,0,0,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000
CVE-2025-6669,0,0,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000
CVE-2025-6674,1,1,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000
CVE-2025-6675,1,1,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000
CVE-2025-6676,1,1,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000
CVE-2025-6677,1,1,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000
CVE-2025-6674,0,0,330dc93de5a800b119559ce432f3e727a55b7663e61bb6a3f51e753d26da542e,2025-06-26T14:15:34.047000
CVE-2025-6675,0,0,d0299463a864b2634b63a6b6631e1d2676a687384aa6c5c64b95b21049704091,2025-06-26T14:15:34.177000
CVE-2025-6676,0,0,904b961e1617fc5b434f2a983c54e82fb2b97c2a706594be0f12c0b7f95a3275,2025-06-26T14:15:34.353000
CVE-2025-6677,0,0,d64d334c8e0095958043e9bdfe68545d6daf525f06d22d3f20470fe56e37e7db,2025-06-26T14:15:34.540000
CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000
CVE-2025-6693,0,0,aed7eff55f11f001475fd2a272338716cf45f574b1a0b5d56772bf159d041cf8,2025-06-26T13:15:29.593000
CVE-2025-6694,1,1,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000
CVE-2025-6695,1,1,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000
CVE-2025-6696,1,1,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000
CVE-2025-6697,1,1,c96659e6099a684ba934d473319311782f9c97ce54ba9ef3bbd88cabdb085dea,2025-06-26T15:15:24.840000
CVE-2025-6698,1,1,30941f8dd3b4210c629a7239c4a179665f5aa7c14bb1dd25d45db98f6c1e9093,2025-06-26T15:15:25.023000
CVE-2025-6694,0,0,ee51f17d9ad75bdeb5c5974329bba1fdde90571ade9e0013b45f8ad9f704c57b,2025-06-26T14:15:34.777000
CVE-2025-6695,0,0,e535137c3817be7c059c48f3c72b85d7d3d98b1b11478f02b3f20aa6ba18bbdf,2025-06-26T14:15:34.967000
CVE-2025-6696,0,0,afc23a687905a86e72dc36166a80d4d75f1137dcb3f841be0fbe42b41be72f13,2025-06-26T15:15:24.633000
CVE-2025-6697,0,1,85c38d785f5e8c32346e3c53b60a2f8abf1eced95890c1012623934462d0a59f,2025-06-26T16:15:32.560000
CVE-2025-6698,0,1,bda5d1b33c6591d4482a182f4472541cfea1ab5eec2230108598768e0855b9c7,2025-06-26T16:15:33.583000
CVE-2025-6699,1,1,ddd4793ac17c57a98ce3f46146e63ab05b772593f92021d9b85a82f069096cae,2025-06-26T16:15:34.590000
CVE-2025-6700,1,1,d6dd6081fc4a3e628511320526388de82806fe3f1879558f59d2b6fa0bfaac74,2025-06-26T16:15:35.740000
CVE-2025-6701,1,1,a3e0912d16ddbd7ead3dd8db87c5dd3a2a97ee56b844df89f0e0b9adfd5dd6e0,2025-06-26T16:15:36.930000
CVE-2025-6702,1,1,3142fcdee56d459a72b1ae0d133a9a195a16dcf0120e56e151b74ceb6f8b3871,2025-06-26T16:15:38.033000
CVE-2025-6703,0,0,09072c2cd4e411c0d5c8360ca7f6fdefccb20fabc17c8c1696e0829eab242c2a,2025-06-26T10:15:25.950000
CVE-2025-6706,1,1,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000
CVE-2025-6707,1,1,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000
CVE-2025-6709,1,1,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000
CVE-2025-6710,1,1,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000
CVE-2025-6706,0,0,f62ce3759b16005649e600aaa9f5f382173758ca404574900daf66e4ff538bac,2025-06-26T14:15:35.157000
CVE-2025-6707,0,0,ec1919161028fcb80da5ac4bad2fe42ce7a27924784bf7ae929f38032df9e6d2,2025-06-26T14:15:35.313000
CVE-2025-6709,0,0,7544591fa0466921cddd7453ee0b219f2c7a2f572e56858afaa90ca58a141123,2025-06-26T14:15:35.463000
CVE-2025-6710,0,0,1c08e8c79115ef953504d39d589598b5f33f4db72e950ece70cb5bd1de02f4b0,2025-06-26T14:15:35.613000

Can't render this file because it is too large.