Auto-Update: 2025-06-16T23:55:19.871254+00:00

This commit is contained in:
cad-safe-bot 2025-06-16 23:59:00 +00:00
parent f887594fb0
commit 2db68b36e3
18 changed files with 1190 additions and 707 deletions

View File

@ -2,93 +2,15 @@
"id": "CVE-2024-57050",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-02-18T15:15:16.977",
"lastModified": "2025-06-06T17:59:21.903",
"vulnStatus": "Analyzed",
"lastModified": "2025-06-16T22:15:20.670",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el TP-Link WR840N V6 router con el firmware Versi\u00f3n 0.9.1 4.16 y antes permite a las personas no autorizadas omitir la autenticaci\u00f3n de algunas interfaces en el directorio/CGI. Cuando agregue el referente: http://tplinkwifi.netnet. a la solicitud, se reconocer\u00e1 como aprobar la autenticaci\u00f3n."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-11714. Reason: This candidate is a reservation duplicate of CVE-2018-11714. Notes: All CVE users should reference CVE-2018-11714 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-287"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:wr840n_firmware:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.9.1_4.16",
"matchCriteriaId": "9921C785-A6AB-4E22-B8AE-791C2E774483"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:wr840n:6:*:*:*:*:*:*:*",
"matchCriteriaId": "79A291AB-FA6F-452E-90B3-2F705A86F83A"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"Exploit"
]
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,32 @@
{
"id": "CVE-2025-27587",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-16T22:15:44.093",
"lastModified": "2025-06-16T22:15:44.093",
"vulnStatus": "Received",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system."
}
],
"metrics": {},
"references": [
{
"url": "https://github.com/openssl/openssl/issues/24253",
"source": "cve@mitre.org"
},
{
"url": "https://minerva.crocs.fi.muni.cz",
"source": "cve@mitre.org"
}
]
}

View File

@ -2,98 +2,15 @@
"id": "CVE-2025-29648",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.460",
"lastModified": "2025-04-24T12:52:00.727",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2025-06-16T22:15:44.517",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link EAP120 router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de inicio de sesi\u00f3n."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:eap120_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "07561227-B7ED-4931-A792-DC5F3EFC60BC"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:eap120:-:*:*:*:*:*:*:*",
"matchCriteriaId": "117B617D-360F-4FF9-8785-1A2CDE1B0EB6"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,98 +2,15 @@
"id": "CVE-2025-29649",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.563",
"lastModified": "2025-04-24T12:51:37.493",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2025-06-16T22:15:55.553",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link TL-WR840N router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:tl-wr840n_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4F2E1762-B468-46CA-A3E9-44B4A21EC437"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:tl-wr840n:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AF3078F3-4CD5-4157-9A2D-7E338B6C7058"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,98 +2,15 @@
"id": "CVE-2025-29650",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.663",
"lastModified": "2025-04-24T13:44:23.137",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2025-06-16T22:16:04.667",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7200_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
"matchCriteriaId": "00D5463C-58B7-400E-9B73-37C7036FE252"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7200:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41438D26-F2D6-4DFC-B13C-A7458CE8F22C"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29650",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,98 +2,15 @@
"id": "CVE-2025-29651",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.760",
"lastModified": "2025-04-24T14:56:11.510",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2025-06-16T22:16:13.750",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 170623 Rel.1022n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 170623 Rel.1022n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7650_firmware:1.0.7:build_170623_rel.1022n:*:*:*:*:*:*",
"matchCriteriaId": "425955C0-305B-4AFD-ADC0-34C6E469559C"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7650:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04ED6964-77D4-48AD-8CA4-0FCA62BB3189"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29651",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,98 +2,15 @@
"id": "CVE-2025-29652",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.860",
"lastModified": "2025-04-24T13:56:26.960",
"vulnStatus": "Analyzed",
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"lastModified": "2025-06-16T22:16:22.843",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7000_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
"matchCriteriaId": "AC7C3EA6-A860-4814-A424-7332FDE625F5"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7000:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F661A5EA-62E0-4073-946F-D279BC385453"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -2,91 +2,15 @@
"id": "CVE-2025-29653",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-04-16T20:15:17.963",
"lastModified": "2025-04-24T13:54:34.550",
"vulnStatus": "Analyzed",
"lastModified": "2025-06-16T22:16:31.940",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SQL Injection vulnerability exists in the TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.2 Build 170306 Rel.1015n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields."
},
{
"lang": "es",
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.2 Build 170306 Rel.1015n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:tp-link:m7450_firmware:1.0.2:build_170306_rel.1015n:*:*:*:*:*:*",
"matchCriteriaId": "FC5FA2EA-3A0C-4E80-B499-1E97DEA3B955"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:tp-link:m7450:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F2F6BAE4-33F8-44D7-8FCF-C7D9AA436BCE"
}
]
}
]
}
],
"references": [
{
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653",
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}
]
"metrics": {},
"references": []
}

View File

@ -0,0 +1,53 @@
{
"id": "CVE-2025-43200",
"sourceIdentifier": "product-security@apple.com",
"published": "2025-06-16T22:16:41.120",
"lastModified": "2025-06-16T22:16:41.120",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals."
}
],
"metrics": {},
"references": [
{
"url": "https://support.apple.com/en-us/122173",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122174",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122345",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122346",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122900",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122901",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122902",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122903",
"source": "product-security@apple.com"
},
{
"url": "https://support.apple.com/en-us/122904",
"source": "product-security@apple.com"
}
]
}

View File

@ -0,0 +1,86 @@
{
"id": "CVE-2025-48992",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-16T23:15:21.827",
"lastModified": "2025-06-16T23:15:21.827",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
},
{
"lang": "en",
"value": "CWE-87"
}
]
}
],
"references": [
{
"url": "https://github.com/Intermesh/groupoffice/commit/2e3695db9cdef1da7a9d754ff4d98f49f6924e2d",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j35g-q5mc-jwgp",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6140",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T22:16:41.250",
"lastModified": "2025-06-16T22:16:41.250",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-400"
},
{
"lang": "en",
"value": "CWE-404"
}
]
}
],
"references": [
{
"url": "https://github.com/gabime/spdlog/commit/10320184df1eb4638e253a34b1eb44ce78954094",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gabime/spdlog/issues/3360",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gabime/spdlog/issues/3360#issuecomment-2729579422",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gabime/spdlog/releases/tag/v1.15.2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312609",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312609",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592999",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,157 @@
{
"id": "CVE-2025-6141",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T22:16:41.527",
"lastModified": "2025-06-16T22:16:41.527",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
"baseScore": 1.7,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "LOW",
"exploitabilityScore": 3.1,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
"source": "cna@vuldb.com"
},
{
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
"source": "cna@vuldb.com"
},
{
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
"source": "cna@vuldb.com"
},
{
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312610",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312610",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593000",
"source": "cna@vuldb.com"
},
{
"url": "https://www.gnu.org/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,137 @@
{
"id": "CVE-2025-6142",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T22:16:41.710",
"lastModified": "2025-06-16T22:16:41.710",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in Intera InHire up to 20250530. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument 29chcotoo9 leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://drive.google.com/file/d/1-doSYzFeLaKtd_b6RmpBtZ5qtsvu4gYI/view?usp=sharing",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312613",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312613",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.587665",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6143",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T23:15:22.500",
"lastModified": "2025-06-16T23:15:22.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/13.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312618",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312618",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593004",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6144",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T23:15:22.683",
"lastModified": "2025-06-16T23:15:22.683",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/688/1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/awindog/cve/blob/main/688/1.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312619",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312619",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593009",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,149 @@
{
"id": "CVE-2025-6145",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-16T23:15:22.863",
"lastModified": "2025-06-16T23:15:22.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/awindog/cve/blob/main/688/2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/awindog/cve/blob/main/688/2.md#poc",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.312620",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.312620",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.593011",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-16T22:00:19.875634+00:00
2025-06-16T23:55:19.871254+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-16T21:45:19.070000+00:00
2025-06-16T23:15:22.863000+00:00
```
### Last Data Feed Release
@ -33,53 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
298054
298063
```
### CVEs added in the last Commit
Recently added CVEs: `9`
- [CVE-2025-32798](CVE-2025/CVE-2025-327xx/CVE-2025-32798.json) (`2025-06-16T20:15:27.200`)
- [CVE-2025-32799](CVE-2025/CVE-2025-327xx/CVE-2025-32799.json) (`2025-06-16T21:15:23.683`)
- [CVE-2025-32800](CVE-2025/CVE-2025-328xx/CVE-2025-32800.json) (`2025-06-16T21:15:23.847`)
- [CVE-2025-47951](CVE-2025/CVE-2025-479xx/CVE-2025-47951.json) (`2025-06-16T21:15:24.010`)
- [CVE-2025-49134](CVE-2025/CVE-2025-491xx/CVE-2025-49134.json) (`2025-06-16T21:15:24.167`)
- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-16T20:15:27.863`)
- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-16T20:15:28.040`)
- [CVE-2025-6138](CVE-2025/CVE-2025-61xx/CVE-2025-6138.json) (`2025-06-16T21:15:24.323`)
- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-16T21:15:24.513`)
- [CVE-2025-27587](CVE-2025/CVE-2025-275xx/CVE-2025-27587.json) (`2025-06-16T22:15:44.093`)
- [CVE-2025-43200](CVE-2025/CVE-2025-432xx/CVE-2025-43200.json) (`2025-06-16T22:16:41.120`)
- [CVE-2025-48992](CVE-2025/CVE-2025-489xx/CVE-2025-48992.json) (`2025-06-16T23:15:21.827`)
- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-06-16T22:16:41.250`)
- [CVE-2025-6141](CVE-2025/CVE-2025-61xx/CVE-2025-6141.json) (`2025-06-16T22:16:41.527`)
- [CVE-2025-6142](CVE-2025/CVE-2025-61xx/CVE-2025-6142.json) (`2025-06-16T22:16:41.710`)
- [CVE-2025-6143](CVE-2025/CVE-2025-61xx/CVE-2025-6143.json) (`2025-06-16T23:15:22.500`)
- [CVE-2025-6144](CVE-2025/CVE-2025-61xx/CVE-2025-6144.json) (`2025-06-16T23:15:22.683`)
- [CVE-2025-6145](CVE-2025/CVE-2025-61xx/CVE-2025-6145.json) (`2025-06-16T23:15:22.863`)
### CVEs modified in the last Commit
Recently modified CVEs: `44`
Recently modified CVEs: `7`
- [CVE-2024-38875](CVE-2024/CVE-2024-388xx/CVE-2024-38875.json) (`2025-06-16T21:39:39.120`)
- [CVE-2024-39329](CVE-2024/CVE-2024-393xx/CVE-2024-39329.json) (`2025-06-16T21:39:25.910`)
- [CVE-2024-39330](CVE-2024/CVE-2024-393xx/CVE-2024-39330.json) (`2025-06-16T21:39:07.157`)
- [CVE-2024-39614](CVE-2024/CVE-2024-396xx/CVE-2024-39614.json) (`2025-06-16T21:38:55.470`)
- [CVE-2025-29573](CVE-2025/CVE-2025-295xx/CVE-2025-29573.json) (`2025-06-16T20:19:43.233`)
- [CVE-2025-30317](CVE-2025/CVE-2025-303xx/CVE-2025-30317.json) (`2025-06-16T21:27:49.447`)
- [CVE-2025-30321](CVE-2025/CVE-2025-303xx/CVE-2025-30321.json) (`2025-06-16T21:32:02.783`)
- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-06-16T21:03:13.033`)
- [CVE-2025-43558](CVE-2025/CVE-2025-435xx/CVE-2025-43558.json) (`2025-06-16T21:31:49.540`)
- [CVE-2025-43589](CVE-2025/CVE-2025-435xx/CVE-2025-43589.json) (`2025-06-16T21:31:39.580`)
- [CVE-2025-43590](CVE-2025/CVE-2025-435xx/CVE-2025-43590.json) (`2025-06-16T21:31:30.193`)
- [CVE-2025-43593](CVE-2025/CVE-2025-435xx/CVE-2025-43593.json) (`2025-06-16T21:31:20.630`)
- [CVE-2025-45236](CVE-2025/CVE-2025-452xx/CVE-2025-45236.json) (`2025-06-16T20:36:27.817`)
- [CVE-2025-45237](CVE-2025/CVE-2025-452xx/CVE-2025-45237.json) (`2025-06-16T20:35:29.437`)
- [CVE-2025-45607](CVE-2025/CVE-2025-456xx/CVE-2025-45607.json) (`2025-06-16T20:17:27.537`)
- [CVE-2025-45612](CVE-2025/CVE-2025-456xx/CVE-2025-45612.json) (`2025-06-16T20:00:50.837`)
- [CVE-2025-46654](CVE-2025/CVE-2025-466xx/CVE-2025-46654.json) (`2025-06-16T21:00:11.573`)
- [CVE-2025-47104](CVE-2025/CVE-2025-471xx/CVE-2025-47104.json) (`2025-06-16T21:31:11.607`)
- [CVE-2025-47105](CVE-2025/CVE-2025-471xx/CVE-2025-47105.json) (`2025-06-16T21:30:52.307`)
- [CVE-2025-47106](CVE-2025/CVE-2025-471xx/CVE-2025-47106.json) (`2025-06-16T21:30:33.830`)
- [CVE-2025-4748](CVE-2025/CVE-2025-47xx/CVE-2025-4748.json) (`2025-06-16T20:15:27.750`)
- [CVE-2025-48976](CVE-2025/CVE-2025-489xx/CVE-2025-48976.json) (`2025-06-16T20:15:27.350`)
- [CVE-2025-48988](CVE-2025/CVE-2025-489xx/CVE-2025-48988.json) (`2025-06-16T20:15:27.447`)
- [CVE-2025-49124](CVE-2025/CVE-2025-491xx/CVE-2025-49124.json) (`2025-06-16T20:15:27.557`)
- [CVE-2025-49125](CVE-2025/CVE-2025-491xx/CVE-2025-49125.json) (`2025-06-16T20:15:27.650`)
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-06-16T22:15:20.670`)
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-06-16T22:15:44.517`)
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-06-16T22:15:55.553`)
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-06-16T22:16:04.667`)
- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-06-16T22:16:13.750`)
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-06-16T22:16:22.843`)
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-06-16T22:16:31.940`)
## Download and Usage

View File

@ -39251,7 +39251,7 @@ CVE-2009-2626,0,0,7d808c3b337b3dd179c5c83f2afaaa2086056b848ea5fcca29f5344102d32c
CVE-2009-2627,0,0,694ff522c2c2384ac2ef84c6917a414a152aa0809bdf43a8e6b69444ebb5c6b5,2025-04-09T00:30:58.490000
CVE-2009-2628,0,0,0d71b5b55b2a76adc0a40b01b856df4d643748d69e1b6d2ddf74be2c3b018f04,2025-04-09T00:30:58.490000
CVE-2009-2629,0,0,c269a1546ec3551cc7c6dd410202f6e170c9edb7369c16ab4c02d0a95dc3053c,2025-04-09T00:30:58.490000
CVE-2009-2631,0,1,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000
CVE-2009-2631,0,0,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000
CVE-2009-2632,0,0,d4abe203f8fe18c26b468bad7eb2075a45826c502661df98d8df1ca946af1681,2025-04-09T00:30:58.490000
CVE-2009-2633,0,0,57a10f8a0370e765cd5c4db6177ea6709b0ea6b7921354cc00d8630e517f7f07,2025-04-09T00:30:58.490000
CVE-2009-2634,0,0,fd4588f61c55fcd0997f4cdc4d78e1193050d47ff58fe3241f247ad7b7d80505,2025-04-09T00:30:58.490000
@ -184979,7 +184979,7 @@ CVE-2021-43579,0,0,7795b4717e11fd2641e463a49231835fce3ea5cb7eb5fb562ec7490a62052
CVE-2021-4358,0,0,b2ea1964b0aaec46c7cef84d55058430bfdf214bac87a1e8b460a29a79125446,2024-11-21T06:37:29.957000
CVE-2021-43581,0,0,8108c5b39f7ca8239e11c52952d79ed5aa76af3ac0ce5532e18c301d3825a99a,2024-11-21T06:29:29.140000
CVE-2021-43582,0,0,43a81bf863d57ab551e8731ccba32f8e965bca39a894587dff864e90e5bc9264,2024-11-21T06:29:29.293000
CVE-2021-43584,0,1,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000
CVE-2021-43584,0,0,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000
CVE-2021-43587,0,0,7fbb5ce8b85874af575c4d094206bbb97a641f3bf8bfdd530f385e73f835079d,2024-11-21T06:29:29.623000
CVE-2021-43588,0,0,5fa55ef971ca4fd6c419512879e9914d923150440b0a909438ef8a8a7aa160f6,2024-11-21T06:29:29.767000
CVE-2021-43589,0,0,1be5e4212f6cd5c9a99dae98461249f5c0dec0cc80b669d16628ab1cd22c953f,2024-11-21T06:29:29.913000
@ -226942,7 +226942,7 @@ CVE-2023-32883,0,0,18723e3d230f195bc0a868976daaa68e0e09f50ea939aff9a7f50817007d3
CVE-2023-32884,0,0,badab0b564d8b0671ccccd8220cc21ebd691ade4e70a70e9932ae240cc9e9b1d,2025-06-03T15:15:31.293000
CVE-2023-32885,0,0,e6ad4cab5f683cd31277c541f39b573a4cab547e3c7cbe67334cd94792821ed1,2025-04-17T19:15:55.867000
CVE-2023-32886,0,0,b130264fbebddf30b7785f9804d4b6984dea839b524cc40be854e297927fa567,2025-06-03T15:15:31.613000
CVE-2023-32887,0,1,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000
CVE-2023-32887,0,0,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000
CVE-2023-32888,0,0,752087afa621d16e61d32ee9c8700b21050b1a9343589eda4eef2d1b19855fd8,2025-05-16T18:16:01.257000
CVE-2023-32889,0,0,e2d8dfe153faa54fe19d590087d31f3105782c0ca961382255d5f028954e56ad,2024-11-21T08:04:16.780000
CVE-2023-3289,0,0,8443b25ebddb1823f9095d1a039ea811ffd9d30f62068eb82d3e7c0037047f18,2024-11-21T08:16:56.233000
@ -227436,7 +227436,7 @@ CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c
CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000
CVE-2023-33536,0,0,cb50e37274d092888d1fe39ac87a363acf8eaa47d7301bb2b831795e57af7d9d,2025-01-07T16:15:31.153000
CVE-2023-33537,0,0,e4de1c536060f7cf7b6b601cdcb55c69fae53fc6ccc20322c7e5aead8394ad75,2025-01-07T16:15:31.423000
CVE-2023-33538,0,1,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000
CVE-2023-33538,0,0,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000
CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000
CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000
CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000
@ -229008,7 +229008,7 @@ CVE-2023-35830,0,0,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89
CVE-2023-35833,0,0,c1bf8e993bff3c15ea6b1d5ea82e7182e9df63907a88f295064618c4d1f070ba,2024-11-21T08:08:46.997000
CVE-2023-35835,0,0,c472cfaca014db3ca099e3bd7467ed6b0670670172a0e8f336efd51e4092fc62,2025-05-30T15:15:22.107000
CVE-2023-35836,0,0,acaaf0e5111795f0a1deca0b38b68c171a0c114afd926ca0ef4711f965e3b753,2025-06-11T17:15:31.923000
CVE-2023-35837,0,1,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000
CVE-2023-35837,0,0,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000
CVE-2023-35838,0,0,183f211cfdb5c0b95769b09aaa0c425385e59381d55642b1813c42fff31c8a36,2024-11-21T08:08:47.637000
CVE-2023-35839,0,0,656f78752e563a12ede3b5803be9c4748192ecddd9db4c5bb9648851053668b6,2024-11-21T08:08:47.797000
CVE-2023-3584,0,0,db20d2c7ac289598080cfe7af369da1c9e2f79983a8f4444c3d60e81d4ca7c03,2024-11-21T08:17:36.207000
@ -231359,7 +231359,7 @@ CVE-2023-38607,0,0,2ce363c1d9b97cb3747e23823fba83b3f8ee2adfbf120a92c7b78eb51b356
CVE-2023-38608,0,0,b71d5a2655ed04c8dddf465e235f7b0639be5f023e883b9a5ba1758064cc8e3b,2024-11-21T08:13:55.913000
CVE-2023-38609,0,0,6dc79f9d60fa5646ad0e783262026af7df43cd2e155e3927d10dda9c9455089f,2024-11-21T08:13:56.030000
CVE-2023-3861,0,0,256bdf9cd413cbfa70ed4e6a0b9211792976947f22c0d0ba6729c1ba3a66e3fc,2024-11-21T08:18:14.550000
CVE-2023-38610,0,1,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000
CVE-2023-38610,0,0,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000
CVE-2023-38611,0,0,0c21e67a52c96f626024280838ea08bd20ff315d2265b8b2d16822974fdb8823,2024-11-21T08:13:56.267000
CVE-2023-38612,0,0,dc7d175e74c392b2fa34b19b326d494d7537b9d88be3ebe3dbd10253f9d4194b,2025-06-03T15:15:38.607000
CVE-2023-38614,0,0,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000
@ -234732,7 +234732,7 @@ CVE-2023-42882,0,0,52d3d6e63624b766645b42f6de5717aa4cf8dfd75908cc909fde080396178
CVE-2023-42883,0,0,f5e872895d15f38cbd7c669092eb1e3aea886639119d160af848a76f82a5203f,2024-11-21T08:23:25.203000
CVE-2023-42884,0,0,2e5a8b2139dbb918dbc0af76f59335eac704130dc73878de8da29830077c7be6,2025-05-27T15:15:30.620000
CVE-2023-42886,0,0,c15407d84b2542d842f4506c0cd71a04ba67406423e4c036a717e97c9a72bbe5,2024-11-21T08:23:25.483000
CVE-2023-42887,0,1,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000
CVE-2023-42887,0,0,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000
CVE-2023-42888,0,0,53dcb8ac8f380ce3afe4718b34f84401ac21952dd00fc8c845621c41239cbfc5,2025-06-16T19:15:23.777000
CVE-2023-42889,0,0,a974df235eb2d3c4ac74c2469929bae42468dda315bde0f114e922e68df14623,2024-12-09T17:10:23.580000
CVE-2023-4289,0,0,84ea1a015248ce44ce4d95acdcd6cce0ce0aea730d50a3bfd933c2196769c933,2025-04-23T17:16:43.033000
@ -237493,7 +237493,7 @@ CVE-2023-46824,0,0,986b06bf57d50728dbf5f80c95830764c980384db658e4991e6c4a53a212b
CVE-2023-4683,0,0,76ee54862a2b6294ce73a6e0f8dddb60dfaac815f4119e8c25a08426a72a9401,2024-11-21T08:35:40.860000
CVE-2023-46835,0,0,e8b24f3a833cecb5e26772221ee94c6e7de234b62344eeb1bf8a83632146bc3e,2024-11-21T08:29:23.593000
CVE-2023-46836,0,0,e0785f3778eb579729a1be636dffebd4a5f98f6ffcf042af2ec5bc63df61c452,2025-06-03T15:15:42.700000
CVE-2023-46837,0,1,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000
CVE-2023-46837,0,0,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000
CVE-2023-46838,0,0,f1babf526c3f5839d278fd86f9852b1cd10fd3733391c516fd9386abab96da86,2025-06-02T19:15:21.687000
CVE-2023-46839,0,0,110c4574be648ab625e9ba9b9f041f367f3cfe8e1328db16490d89d1854556ab,2024-11-21T20:15:36.450000
CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7edf,2024-11-21T08:29:24.200000
@ -239448,7 +239448,7 @@ CVE-2023-4942,0,0,3c7a5d772b22681bef3ed3e6c9496e43c134a6f368f32a6bae14ed4d3847ad
CVE-2023-49424,0,0,d2f93e70c9be16993bbf1d8c7906db8335f897b831e85223bdf76f20c47bff6d,2024-11-21T08:33:22.383000
CVE-2023-49425,0,0,41aec47a68b046d68f3afc2d29f4e86911729f41a2d38db56112b7fe298a8b42,2024-11-21T08:33:22.637000
CVE-2023-49426,0,0,24ccb283dd811b7bbe9dac5994304963d40e99b04308ac6657fd7508af2d4466,2024-11-21T08:33:22.793000
CVE-2023-49427,0,1,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000
CVE-2023-49427,0,0,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000
CVE-2023-49428,0,0,868063d4b88a113eac2ad7dfd7a983c90c1888bd4c0fd88457e82c182b022090,2024-11-21T08:33:23.093000
CVE-2023-49429,0,0,2e5afa3b83b44af2a51b62ff5369b8e7b42a100071b9f2a98c76a7854b28d0f5,2024-11-21T08:33:23.327000
CVE-2023-4943,0,0,1a8987516543f87ce2b5b23583241ad5040c167598f6c1afaf4a0e38f4c156b6,2024-11-21T08:36:19.200000
@ -239509,7 +239509,7 @@ CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2
CVE-2023-49546,0,0,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000
CVE-2023-49547,0,0,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000
CVE-2023-49548,0,0,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000
CVE-2023-49549,0,1,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000
CVE-2023-49549,0,0,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000
CVE-2023-49550,0,0,2c81aa1b1a990754ef879c26f0a6ee754ede0d23bfa96a1085f14891646cb258,2025-05-16T18:16:01.490000
CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000
CVE-2023-49552,0,0,ae4e673718d2ece6c9d20818d4dbdbed3840be8be0432a45b27d72d6dac502e9,2025-04-17T19:15:57.020000
@ -251587,7 +251587,7 @@ CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676
CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000
CVE-2024-22074,0,0,8ce1416a2a2c2062f8a4515755c7506139d9261992e4df0985ed7bb84eb5f26f,2025-03-18T21:15:23.753000
CVE-2024-22075,0,0,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000
CVE-2024-22076,0,1,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000
CVE-2024-22076,0,0,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000
CVE-2024-22077,0,0,8d56db529de03b85ebd97acb9333cc2ed26899ac306cf0acec7262d040dc588a,2025-04-16T18:20:36.067000
CVE-2024-22078,0,0,46ee7f1461ed88577c888e3c7fb500abb803e96986ad6800d0492878c6e910de,2025-04-16T18:20:45.887000
CVE-2024-22079,0,0,954368bce62047e9105fd47ef1997588788142259ffb5d52007fda3ef1f622d2,2025-04-16T17:28:31.577000
@ -252836,7 +252836,7 @@ CVE-2024-23736,0,0,79df2399a819d34fa678176aa1fa937f65e00863f268b4896e44d2087292c
CVE-2024-23737,0,0,540efa9ee00efd37944f43ad1656f3b195cf720184caf65cc0e057840cf72c9f,2025-03-18T15:15:47.677000
CVE-2024-23738,0,0,194fa187167961d4a7ea8823665a156c16bef0fdb38b3bf079adecd3590504b6,2024-11-21T08:58:17.097000
CVE-2024-23739,0,0,5fca16dbc725b4436fe41f1f025ceb46fcd84b9811e3b3737739d8cf70da2c24,2025-05-29T16:15:35.657000
CVE-2024-23740,0,1,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000
CVE-2024-23740,0,0,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000
CVE-2024-23741,0,0,cec6fa87499b6b24bec1cad23d019ade6552bf7a67f18abab2c2cdd15debb8a8,2025-06-03T19:15:38.503000
CVE-2024-23742,0,0,60ce68668ba096e31d7358004d46252e5708dd5c7e16e43273c83b3627661a67,2024-11-21T08:58:17.843000
CVE-2024-23743,0,0,c4ab1516b8f8c866ff87e9e1f54df21c028456ef3e5af76f499e4f60c61bd176,2024-11-21T08:58:18.013000
@ -252997,7 +252997,7 @@ CVE-2024-23897,0,0,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4e
CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000
CVE-2024-23899,0,0,c9706debcbb25b54a6bc875acb0da336d766e313da3eea8e6dba91d19993d393,2025-06-04T15:15:23.400000
CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000
CVE-2024-23900,0,1,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000
CVE-2024-23900,0,0,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000
CVE-2024-23901,0,0,49bcb4810f55c620816c3f0e594dbd0087699ab58f867f02a2b90676bb50fc8e,2025-05-30T15:15:39.480000
CVE-2024-23902,0,0,c73fb2fe61aff6c4d1ed0d50eabeaf4ebe1700493a0b0e65d14e9f623c631a00,2025-05-30T15:15:39.690000
CVE-2024-23903,0,0,7b6250a29108c7172c9048bcf6031f095bf8c0ec94ede321b93e4b7334b19c5a,2024-11-21T08:58:40.513000
@ -260432,10 +260432,10 @@ CVE-2024-33773,0,0,034058b04ec93ca6c5edc4f174f8f4df83d661d3c6f32106b0dd0a828f81c
CVE-2024-33774,0,0,52b770b7f333615156ba87f01b3cea08102d5ac65159461b358a36f647f81817,2025-05-21T14:42:59.237000
CVE-2024-33775,0,0,bc597e520cb5802c10bcc9b429b021dd323dfc44b73d29075d59180bbe1246e2,2024-11-21T09:17:28.473000
CVE-2024-3378,0,0,3baf56e09d4e512582bd0fad8896d230d93b23be4ed5cff61b2d7585ee2d7eb6,2024-11-21T09:29:29.847000
CVE-2024-33780,0,1,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000
CVE-2024-33781,0,1,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000
CVE-2024-33782,0,1,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000
CVE-2024-33783,0,1,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000
CVE-2024-33780,0,0,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000
CVE-2024-33781,0,0,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000
CVE-2024-33782,0,0,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000
CVE-2024-33783,0,0,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000
CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000
CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000
CVE-2024-33788,0,0,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000
@ -262482,7 +262482,7 @@ CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8a
CVE-2024-3630,0,0,f45524cfa972af7bb2aff53d16e1a1b83041609f3cdf694c64819cdf2dc69047,2025-05-15T14:13:56.197000
CVE-2024-36302,0,0,deb43f7268cf50cfed94b6e52be5d17bf5e3fbe5fd4ac51c48040db4fad24517,2025-05-29T20:20:31.940000
CVE-2024-36303,0,0,b4111938d128c9565d65f07c6c56322c350c793e76b61c6854b8deaf71b80e05,2025-03-25T19:15:43.273000
CVE-2024-36304,0,1,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000
CVE-2024-36304,0,0,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000
CVE-2024-36305,0,0,6cfa43069ee33e00c30d8fa3baead3036438742e2cae79ef30cc5d5dbaececa6,2025-03-14T02:15:14.077000
CVE-2024-36306,0,0,64b14f3a298243574030100c00019e79538277aa5e06c79a15c2ad9d80646a47,2025-03-27T21:15:49.143000
CVE-2024-36307,0,0,51d04be494c1bf54f841be1910d46ae0bb0c05ba90a56fa1759530c58c0d282e,2024-11-21T09:22:00.763000
@ -263245,7 +263245,7 @@ CVE-2024-37285,0,0,e8cc98ed37c5497fbc9f92b308c74c874cd45490ed814f99ca1ead61244ae
CVE-2024-37286,0,0,b4282d67550d8be06ee44ec1a1d7f9fab63643d7219a6e606e7fbac14d351953,2024-09-11T20:20:34.503000
CVE-2024-37287,0,0,bcf9844fa80494210d104fcba352f6ab7b4fe100f45f4712e22ea47490257093,2024-08-22T13:33:12.477000
CVE-2024-37288,0,0,3475a41b766be52846504d882c74d10d7a859ac0e1e60ce1dc0f10d4b0be8ed9,2024-09-16T13:29:06.023000
CVE-2024-37289,0,1,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000
CVE-2024-37289,0,0,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000
CVE-2024-3729,0,0,65abd6654c17cc3e018ee04581d61c620b50a730e72a5a977007e121eb77577c,2025-06-05T20:27:10.677000
CVE-2024-37293,0,0,2903e889cdd9f8be1e4ad48b17a596c07af5b20d5dcb6cbc56e38733c334d0fe,2024-11-21T09:23:32.963000
CVE-2024-37294,0,0,a18f9fa103420601f5842225843a4bd9744b5082925500986dd9d320528b58ee,2024-11-21T09:23:33.123000
@ -264668,7 +264668,7 @@ CVE-2024-38871,0,0,aaca5100a2da9e7b5d586a9692295acab5c9d0d91eda66f1860ebeb293e90
CVE-2024-38872,0,0,47ea80c2905b4fcc836b85526e852dd82f3dd2956ab3cfac662114764141134e,2024-11-21T09:26:54.350000
CVE-2024-38873,0,0,f2ba5412275048e33812e6176a6bf99f7df96dd1ba2fdb85068e1d077b18f066,2025-03-14T19:15:46.563000
CVE-2024-38874,0,0,4355134bc7b65d4c8d4d874d6387ce19d5bde4ef04856b24cade7c33a3fdf2d3,2025-03-24T21:15:17.203000
CVE-2024-38875,0,1,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000
CVE-2024-38875,0,0,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000
CVE-2024-38876,0,0,382393d19d29340103e034acb95663867b49aa61928e9d6677747c9fde52b56e,2024-09-17T14:45:04.577000
CVE-2024-38877,0,0,debb17cf13d15d92eae54014caecd50256c36b5032209a063b03638e2fcdc712,2024-09-20T23:35:04.073000
CVE-2024-38878,0,0,0427331b5276e0aaf96c22ec915ceec80379648af41050ea650c27397769ec91,2024-09-17T15:50:41.117000
@ -264914,9 +264914,9 @@ CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae6
CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000
CVE-2024-39327,0,0,f1d9ff16bae4b39dc8ccb82deff44aa6b991a127e7526d125d453464456f070b,2025-03-17T22:15:12.800000
CVE-2024-39328,0,0,a00e9dbdd3e55bbdf614ef0ad9d1cf5f35291f7ebcc2655205839e9683cf46cf,2025-02-18T20:15:18.533000
CVE-2024-39329,0,1,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000
CVE-2024-39329,0,0,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000
CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000
CVE-2024-39330,0,1,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000
CVE-2024-39330,0,0,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000
CVE-2024-39331,0,0,f95fa1eb69af148f11a765a1ec92c46fcf56bb3e58c0541443e234e8b15a8d12,2025-04-30T16:44:51.867000
CVE-2024-39332,0,0,1f97303c758e324e488ed758e883e305ce844aaff7524d06547eb074ededefc3,2024-11-01T16:35:21.290000
CVE-2024-39334,0,0,6658b5cdd9b8f471072648252d10cf59fe676c32ec2f32b00395e3dab4f56b09,2024-11-21T09:27:29.230000
@ -265197,7 +265197,7 @@ CVE-2024-3961,0,0,9adcc99617b8264560a448864cfa925b25ac1a522a680cd7491d3775365a24
CVE-2024-39610,0,0,5343055bcd0163768ab6327ea58c70d44bca3d34250efd82fb84b72dc771d3be,2024-11-20T15:02:14.297000
CVE-2024-39612,0,0,33a99f9d5e7a84847570107d4ada7b5da5e937e8a3e280000a5cc5660179c96b,2024-09-04T16:38:56.383000
CVE-2024-39613,0,0,7cafea60d2bb85cb27b66cde858f3744dc167d0cc43f0183fc2d18ab2b4fb18b,2024-09-20T13:59:01.117000
CVE-2024-39614,0,1,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000
CVE-2024-39614,0,0,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000
CVE-2024-39619,0,0,067410b7de6a8e32a69b3466976f3f37f3994accf19c4b46d2a649c1738d9ab4,2025-03-07T12:16:26.617000
CVE-2024-3962,0,0,ac26c730ea7e98c5ae97bfda18ed5791ce686630787c902a3918c7f11fcc01ad,2025-02-07T02:07:02.537000
CVE-2024-39620,0,0,3103eb99384deca53db687a27b3e5caaa6689cbe4eb572f735afe1f0771046b8,2024-08-30T16:30:39.210000
@ -277806,7 +277806,7 @@ CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01
CVE-2024-57046,0,0,fe99d44204f56661f0679c5d1ecb0fd6df526b6f6fc17cfa20ea09ee55d671c5,2025-02-19T22:15:23.207000
CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000
CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
CVE-2024-57050,0,1,f6fe4502a7b18901ddf478890a963604732260de8ad7ae059ab03cc4eda5a419,2025-06-16T22:15:20.670000
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
@ -289630,6 +289630,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321
CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000
CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000
CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000
CVE-2025-27587,1,1,737c929fdf729bd27a538e97494a0e65a31a264aa1fa51392616b0e648b80f2d,2025-06-16T22:15:44.093000
CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000
CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000
CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000
@ -290389,7 +290390,7 @@ CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258a
CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000
CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000
CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000
CVE-2025-29573,0,1,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000
CVE-2025-29573,0,0,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000
CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000
CVE-2025-2959,0,0,2e5fb15945faaa1aff3f84ae92ae41d627608b92925fe249b869a66c5d1ada9d,2025-04-15T18:17:30.903000
CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000
@ -290406,13 +290407,13 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
CVE-2025-29648,0,0,a7eaa771354a705b285f1c3684a3f953432537672eb28b52e912d0d68517ff15,2025-04-24T12:52:00.727000
CVE-2025-29649,0,0,d9f19c85152376fc41b6043f80b049c59ec4caf7c602a3488f5c6538fbc911b7,2025-04-24T12:51:37.493000
CVE-2025-29648,0,1,84bec7b21f7c56a1385297c289052d8ecde84cec92268af480ddf8554a7270a0,2025-06-16T22:15:44.517000
CVE-2025-29649,0,1,674d024497e2e807662619a838994b70647b9018a5b3a3e54a8fa02abea03a23,2025-06-16T22:15:55.553000
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
CVE-2025-29650,0,0,5f46dc6c7a387a28666637bcf7367f72ffe82767fe1270be661aad1f55cd5e69,2025-04-24T13:44:23.137000
CVE-2025-29651,0,0,ee2e1abdc8add2e978c76a5d12cc323b8871d73c897faeaf0b2250b0a3c28292,2025-04-24T14:56:11.510000
CVE-2025-29652,0,0,725117646d812bd9ba15bdbfca81a3949128b5f16ff0950b6d0bfd05d931b133,2025-04-24T13:56:26.960000
CVE-2025-29653,0,0,56b2d2a07b99b4d66ca95d61135d9f92c834689e3e3ed529503dfff30cff5718,2025-04-24T13:54:34.550000
CVE-2025-29650,0,1,cb690fb06c7e170a94213a0089eba59b88ea6951964a1db72e6fe406f0c5d8c0,2025-06-16T22:16:04.667000
CVE-2025-29651,0,1,bffa517747fb1fd066ce6168347e27bf8df7ca0a832f9d9f64bf0567578be439,2025-06-16T22:16:13.750000
CVE-2025-29652,0,1,8d5c668462d815386589b7176986a0f06753f6b9c9cb94261388491c1b545a66,2025-06-16T22:16:22.843000
CVE-2025-29653,0,1,67a65ee0fcb50c85eef841f0e84da2c245401851e7c01a4f02b2fa6f7a74fb5e,2025-06-16T22:16:31.940000
CVE-2025-29659,0,0,f9e8d6621163c83dcf8fec3e0aa9d79236f03dcdde01fbd274cbdbc678026bf1,2025-04-23T14:08:13.383000
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
CVE-2025-29660,0,0,7872b4589e7a281e05a7df2d5b23f35c28a06e32d443bbdd2d26b4ef96f8e1b9,2025-04-23T14:08:13.383000
@ -290820,12 +290821,12 @@ CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2
CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000
CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000
CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000
CVE-2025-30317,0,1,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000
CVE-2025-30317,0,0,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000
CVE-2025-30318,0,0,e9585c50b60ffa8b64da830b96992e12585dd9971124ba2c8ec2d12aa9784ca0,2025-05-14T14:28:36.363000
CVE-2025-30319,0,0,eb12dac8472fdfe9992ec3368e7c4232ecf79a9fba5a19c43d0577fbd40d843d,2025-05-14T14:28:51.907000
CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000
CVE-2025-30320,0,0,5faa500599293b831a4781f7de4dfeab3c23d52e0e4bd715e06e02481844c75b,2025-05-14T14:28:59.920000
CVE-2025-30321,0,1,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000
CVE-2025-30321,0,0,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000
CVE-2025-30322,0,0,fffb143d86fda45cfaab46b7f00cb9ce6863b83ec5cc74e528f6ecd921540634,2025-05-19T17:10:08.910000
CVE-2025-30324,0,0,cc814187ea587e10cc609b1aa2e1d499f6d169893aea075eef7cd426f0fb5529,2025-05-22T18:34:10.280000
CVE-2025-30325,0,0,28ff58c7866f3c5b8b7c6c71294d9237d94bc56e945e412c9e15b3bb0632bfd8,2025-05-22T18:33:36.103000
@ -292946,10 +292947,10 @@ CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848
CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
CVE-2025-32797,0,0,28082659442d2f9caf3b20b177923fc2a5249fb7d4c413f133fbad3ac6617b7c,2025-06-16T19:15:33.510000
CVE-2025-32798,1,1,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000
CVE-2025-32799,1,1,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000
CVE-2025-32798,0,0,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000
CVE-2025-32799,0,0,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000
CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000
CVE-2025-32800,1,1,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000
CVE-2025-32800,0,0,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000
CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000
CVE-2025-32802,0,0,f6e78eb116b2cd56d8ef0898bf440fc0936b1baf62e5eadf8e89c04d3f335f9e,2025-05-29T14:29:50.247000
CVE-2025-32803,0,0,f6920fa88ece4e7143788cee904b73826ee8e5e4a2ab79ec11586c6e694e4f40,2025-05-29T14:29:50.247000
@ -293475,7 +293476,7 @@ CVE-2025-3634,0,0,f1df1ce281d4f05da7d71805ec7234d4d7b9375eb0df11046db6b194005749
CVE-2025-3635,0,0,d0b560b1de78f379fe7f701ac4faf0bc2dd5f1916438a1bf60f9e86147301708,2025-04-29T13:52:28.490000
CVE-2025-3636,0,0,ceaad85bcd46f58415162f18dbf8cfc38d5ab635c16737d3ade9ca6e7b13c8d6,2025-04-29T13:52:28.490000
CVE-2025-3637,0,0,c87041797c311e81a89dfd1fc18de62f159879af670bfc90cb09b45a20c270e1,2025-04-29T13:52:28.490000
CVE-2025-3638,0,1,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000
CVE-2025-3638,0,0,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000
CVE-2025-3640,0,0,6bdde0071981ec66085b65d919467b17b738e8eae4a4b1251a80c28ae8725e70,2025-04-29T13:52:28.490000
CVE-2025-3641,0,0,dbfd44d03760d8b3be148abd0efc0467b1e063b595f60cf58929e9634a8e273d,2025-04-29T13:52:28.490000
CVE-2025-3642,0,0,ca4fa0ca9109366f127ceafe021e351913f33001fd19e6b1dd6b95dc80ada57f,2025-04-29T13:52:28.490000
@ -294792,6 +294793,7 @@ CVE-2025-4315,0,0,321394bc3849af4ab9b6cd61bfefb289f1f6cc25ce89390fc43856f0333190
CVE-2025-4316,0,0,a850e49ba627f858db58117c4cb778bc199e996d4e90b919c7290f94c5d139b8,2025-05-14T13:15:48.907000
CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000
CVE-2025-4318,0,0,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000
CVE-2025-43200,1,1,91f3d0c6a5bc8d72322fe26af614b864d8e65f6dd74cd9172b8234b9066c7270,2025-06-16T22:16:41.120000
CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000
CVE-2025-4323,0,0,c1269792d01afee15d189426619dce99f2b7fd20ca7e7484441a414f66a84606,2025-05-07T14:13:35.980000
CVE-2025-4324,0,0,322bfee86bcfcb6ca23d23a1743d3ee5a6951408d15d6bec55f13d4d4fd25fa3,2025-05-07T14:13:35.980000
@ -294836,7 +294838,7 @@ CVE-2025-43554,0,0,72f8a55aa3016b7b98602aea28c96ba8387be55ce503a81731ea16020f85c
CVE-2025-43555,0,0,19d4da2bfc545b26b865091f8de87f344da2925ac800cb983df6cbdd3dd38236,2025-05-15T18:39:08.297000
CVE-2025-43556,0,0,eca516d80145b82d74e737be6b84aa271756b3ab57b5bfd3b44c5b6cb06029d1,2025-05-15T18:39:00.157000
CVE-2025-43557,0,0,46ce49a54afa407d288372144d1569006db3ee5a386d9b87264495da2521727d,2025-05-15T18:38:50.533000
CVE-2025-43558,0,1,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000
CVE-2025-43558,0,0,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000
CVE-2025-43559,0,0,5ba3945b07996edeb9a056650b7e4cc9fac22eca84981fc7a2c7dcc1b7da159c,2025-05-19T20:31:34.550000
CVE-2025-4356,0,0,1808eaf22cb046635d44f9db8c325a9360bb6eb68204b8a94aa8ea43d160384c,2025-05-13T20:24:15.620000
CVE-2025-43560,0,0,f024c3768806730423456b31d211372c754d424eed90de6b61cf7127fc2f200a,2025-05-19T20:35:23.227000
@ -294865,10 +294867,10 @@ CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc1
CVE-2025-43585,0,0,0ee58ab063c833215b13953595c7415a2875f7dfd620cd1a98fc39dd0300acdd,2025-06-12T16:06:39.330000
CVE-2025-43586,0,0,84d6946d4240412f9ea7e35b1116044dd84f632670958760f891cc307e06b113,2025-06-12T16:06:39.330000
CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6deb5,2025-06-12T16:06:29.520000
CVE-2025-43589,0,1,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
CVE-2025-43590,0,1,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
CVE-2025-43593,0,1,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000
CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000
CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000
@ -295185,8 +295187,8 @@ CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35
CVE-2025-4516,0,0,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000
CVE-2025-4517,0,0,8f51c46af888510dd73bb462bbca2c104af9d3c9f1d6809b8679167122b8adcb,2025-06-05T14:15:33.050000
CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000
CVE-2025-45236,0,1,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000
CVE-2025-45237,0,1,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000
CVE-2025-45236,0,0,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000
CVE-2025-45237,0,0,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000
CVE-2025-45238,0,0,b39549f1b61e24807431d3a951f2254a17eb0dbb519151422154254ab9990a40,2025-06-12T17:39:05.167000
CVE-2025-45239,0,0,991350366fb0c83185e15ef1dc4c822dd146409f9225ec787d11246fc95065fc,2025-06-12T17:34:08.947000
CVE-2025-4524,0,0,9f2ebfa9f8ca01d98c78b645fd8edee7f81ea49ceedcaa7d6aa7658167675b4b,2025-05-21T20:24:58.133000
@ -295253,13 +295255,13 @@ CVE-2025-4557,0,0,923891368ba582855d183f0d5ed088d1956f49e0c8ca1b57be2ee3de815507
CVE-2025-4558,0,0,c51dcc9b20597a586f895771ce09346fff8c096f4a984512090059be827823b1,2025-05-12T17:32:32.760000
CVE-2025-4559,0,0,501974ee65c3407829c4ff0fc2a00de3038d9f8b3a2c9015f4408c8d496962ee,2025-05-12T17:32:32.760000
CVE-2025-4560,0,0,823d3f1a0cdcb165bbc1b67941faa6edd3e4515651bcf7fd119ca884109cd9b0,2025-05-12T17:32:32.760000
CVE-2025-45607,0,1,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000
CVE-2025-45607,0,0,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000
CVE-2025-45608,0,0,7e3c4c58c1ade44391ab70b89a990f1ca9ac0effbe72f1f748d083655476c797,2025-05-06T14:15:37.827000
CVE-2025-45609,0,0,06affab3802b43ae1968573a7a3af6dd916eb663f70dda2f2ad7c25bb77cc10d,2025-05-06T14:15:37.983000
CVE-2025-4561,0,0,e4177b88ab0583a3c8a6f6e3d419ecb83b860ceaf129cd282a7808dbb5d294e0,2025-05-12T17:32:32.760000
CVE-2025-45610,0,0,36fda72579ee19bcdaf663e853af79b2168dd075bca3c6cbdaf261b30ad1f0e0,2025-05-06T14:15:38.153000
CVE-2025-45611,0,0,e0ef9e668b81f5bbbbc066e7d93540ec7cf50f0cdb3ee5117e568efa0fa1f968,2025-05-06T14:15:38.317000
CVE-2025-45612,0,1,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000
CVE-2025-45612,0,0,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000
CVE-2025-45613,0,0,576651e2464558fbb6a2d5fd1d1a5eaec94a8b79e83eb09711f47a8a962694b8,2025-05-06T14:15:38.630000
CVE-2025-45614,0,0,11010ca358744e76d6a8d87844f129a25b0b063b116429fdbd92c04c1d120279,2025-05-06T04:16:14.580000
CVE-2025-45615,0,0,cd4b38212bfe3b58d8a8954f5868c330ece936029e48916fc212bace97574bc7,2025-05-06T04:16:16.153000
@ -295664,7 +295666,7 @@ CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa269
CVE-2025-46646,0,0,9a8a54d0124778094859178ae2a1be4b3ab7d35f7adc764a918d49bfc846da89,2025-04-29T13:52:10.697000
CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000
CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000
CVE-2025-46654,0,1,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
CVE-2025-46655,0,0,34630625faf28d1a43b5cdb5fca99ebd8a91139b3a9b9f2e1d3fba1d80e58054,2025-04-29T16:15:37.440000
CVE-2025-46656,0,0,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416d7e,2025-04-29T16:15:37.573000
CVE-2025-46657,0,0,4b6d658b20503b01465fb89f1f4e404ee10732b42838e3f3a51606289348610b,2025-05-12T19:07:34.390000
@ -296012,9 +296014,9 @@ CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673
CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000
CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000
CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000
CVE-2025-47104,0,1,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
CVE-2025-47105,0,1,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
CVE-2025-47106,0,1,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
CVE-2025-47107,0,0,fdd924643f30ad0038e7fd95dd810702588a19273ddc406fc67f30e962777fd0,2025-06-12T16:06:29.520000
CVE-2025-47108,0,0,357230c30613137af807a607a4225bc350d8e27b93f9449fb985d3fecb4482a6,2025-06-12T16:06:39.330000
CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000
@ -296170,7 +296172,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375
CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000
CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000
CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000
CVE-2025-4748,0,1,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000
CVE-2025-4748,0,0,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000
CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000
CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000
CVE-2025-47482,0,0,961d8ef4753c50b36e4d7feaf8debc74b4e022889d69dcdb4a7b418fc8bebc1e,2025-05-08T14:39:18.800000
@ -296525,7 +296527,7 @@ CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefad
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
CVE-2025-47950,0,0,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000
CVE-2025-47951,1,1,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000
CVE-2025-47951,0,0,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000
CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000
CVE-2025-47953,0,0,4efadcb8de5ee103c4397343fd477ac2f1cc76312f377843529dc0565acd9d4e,2025-06-12T16:06:29.520000
CVE-2025-47955,0,0,eb2ec88dd5cc932731cf640b586ede1e8a1ad4d65d53649a0708f1fa7a7dcbc2,2025-06-12T16:06:29.520000
@ -296963,11 +296965,12 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292
CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000
CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
CVE-2025-48976,0,1,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000
CVE-2025-48976,0,0,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
CVE-2025-48988,0,1,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000
CVE-2025-48988,0,0,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
CVE-2025-48990,0,0,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000
CVE-2025-48992,1,1,020a35cfe3046cb69fffeb0fe8d92462d7fc52c795b4589f9a69904b72342f16,2025-06-16T23:15:21.827000
CVE-2025-48994,0,0,2347eea9d248ee0ef643957a0a53d1ea86b7f69fd6aea9013390675ac9969f47,2025-06-02T17:32:17.397000
CVE-2025-48995,0,0,13be942b01243f59599a7f021ac94d7f691b51f24284ec645c1ab118368b0b77,2025-06-02T17:32:17.397000
CVE-2025-48996,0,0,a5bc0462fba0b0454b69362838585b85b6432cd607f3470780f5a230a04991c5,2025-06-04T14:54:33.783000
@ -297012,15 +297015,15 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369
CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000
CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
CVE-2025-49124,0,1,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000
CVE-2025-49125,0,1,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000
CVE-2025-49124,0,0,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000
CVE-2025-49125,0,0,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000
CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000
CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000
CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000
CVE-2025-49130,0,0,c7a7f43db7ab1736ae0ac701a4154668121fb632c9f0116d3af26488234c6f03,2025-06-12T16:06:47.857000
CVE-2025-49131,0,0,8a44c490c7fa295d5533f610dd64963399edc71879b888527baab1ab4d531129,2025-06-12T16:06:47.857000
CVE-2025-49133,0,0,8088c6aaceb03a008d386616b846a037fdecedf4d2cd5516fa2cf3ebcd733d0a,2025-06-12T16:06:29.520000
CVE-2025-49134,1,1,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000
CVE-2025-49134,0,0,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000
CVE-2025-49136,0,0,c1d869d890c14268fd4f2fb480144530c7eab04eea9b543be4e0614ad0048264,2025-06-12T16:06:47.857000
CVE-2025-49137,0,0,a477190bb63ed4681206816d4240428efe69c92093321f84a64a5bd0869453f3,2025-06-12T16:06:47.857000
CVE-2025-49138,0,0,8c9222e6db28a0722fcd86b0c6153a24f83a1107e7a502e6df61b7751665bb28,2025-06-12T16:06:47.857000
@ -298044,10 +298047,16 @@ CVE-2025-6132,0,0,94b02d7f3985b6649b8d5c4432445df1fe94d7793a3e8e46bb2916e7f8ee69
CVE-2025-6133,0,0,27d52f36b7e8d5b05576aa449ff5731fc04b86760269fdcdf2273be8ac827c92,2025-06-16T18:15:22.033000
CVE-2025-6134,0,0,4257b9cd77f1960d6cdf4eeb3bffc7ec6ddfc5aca9d6259ece844471c8473564,2025-06-16T19:15:34.633000
CVE-2025-6135,0,0,29e788198e5272e3b58eef7a2549776ef0373c688e618eda330248e6560eaf81,2025-06-16T19:15:34.850000
CVE-2025-6136,1,1,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000
CVE-2025-6137,1,1,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000
CVE-2025-6138,1,1,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000
CVE-2025-6139,1,1,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000
CVE-2025-6136,0,0,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000
CVE-2025-6137,0,0,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000
CVE-2025-6138,0,0,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000
CVE-2025-6139,0,0,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000
CVE-2025-6140,1,1,b4769e2ad859cd6aad24ff664586d54d514a3baa4745610fe22c97c6833e6a97,2025-06-16T22:16:41.250000
CVE-2025-6141,1,1,2541dd4213d822272a8ed07f6043934e922cfdefe6ec3d88a669822ded83f053,2025-06-16T22:16:41.527000
CVE-2025-6142,1,1,db688935d8075655dfd000e77c5911a0d1cb69d0bfe761db1b8980de9960e1d7,2025-06-16T22:16:41.710000
CVE-2025-6143,1,1,5a45a270d06f2e4e533159e0a51094901e0eeea9008d15cc57f14739c54b844a,2025-06-16T23:15:22.500000
CVE-2025-6144,1,1,99e48eaa193e4b62e7191e8d52c6345135d324216f04cbbdba8519edb362ce54,2025-06-16T23:15:22.683000
CVE-2025-6145,1,1,2e898950b03f74de6d569cac07508094946b059ab1dfd4f6ec1f379f9376a406,2025-06-16T23:15:22.863000
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000

Can't render this file because it is too large.