mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-16T23:55:19.871254+00:00
This commit is contained in:
parent
f887594fb0
commit
2db68b36e3
@ -2,93 +2,15 @@
|
||||
"id": "CVE-2024-57050",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-02-18T15:15:16.977",
|
||||
"lastModified": "2025-06-06T17:59:21.903",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-16T22:15:20.670",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability in the TP-Link WR840N v6 router with firmware version 0.9.1 4.16 and earlier permits unauthorized individuals to bypass the authentication of some interfaces under the /cgi directory.When adding Referer: http://tplinkwifi.net to the the request, it will be recognized as passing the authentication."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Una vulnerabilidad en el TP-Link WR840N V6 router con el firmware Versi\u00f3n 0.9.1 4.16 y antes permite a las personas no autorizadas omitir la autenticaci\u00f3n de algunas interfaces en el directorio/CGI. Cuando agregue el referente: http://tplinkwifi.netnet. a la solicitud, se reconocer\u00e1 como aprobar la autenticaci\u00f3n."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-11714. Reason: This candidate is a reservation duplicate of CVE-2018-11714. Notes: All CVE users should reference CVE-2018-11714 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-287"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:wr840n_firmware:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "0.9.1_4.16",
|
||||
"matchCriteriaId": "9921C785-A6AB-4E22-B8AE-791C2E774483"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:wr840n:6:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "79A291AB-FA6F-452E-90B3-2F705A86F83A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Shuanunio/CVE_Requests/blob/main/TP-Link/WR840N%20v6/ACL%20bypass%20Vulnerability%20in%20TP-Link%20TL-WR840N.md",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory",
|
||||
"Exploit"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
32
CVE-2025/CVE-2025-275xx/CVE-2025-27587.json
Normal file
32
CVE-2025/CVE-2025-275xx/CVE-2025-27587.json
Normal file
@ -0,0 +1,32 @@
|
||||
{
|
||||
"id": "CVE-2025-27587",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-06-16T22:15:44.093",
|
||||
"lastModified": "2025-06-16T22:15:44.093",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "OpenSSL 3.0.0 through 3.3.2 on the PowerPC architecture is vulnerable to a Minerva attack, exploitable by measuring the time of signing of random messages using the EVP_DigestSign API, and then using the private key to extract the K value (nonce) from the signatures. Next, based on the bit size of the extracted nonce, one can compare the signing time of full-sized nonces to signatures that used smaller nonces, via statistical tests. There is a side-channel in the P-364 curve that allows private key extraction (also, there is a dependency between the bit size of K and the size of the side channel). NOTE: This CVE is disputed because the OpenSSL security policy explicitly notes that any side channels which require same physical system to be detected are outside of the threat model for the software. The timing signal is so small that it is infeasible to be detected without having the attacking process running on the same physical system."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/openssl/openssl/issues/24253",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://minerva.crocs.fi.muni.cz",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,98 +2,15 @@
|
||||
"id": "CVE-2025-29648",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.460",
|
||||
"lastModified": "2025-04-24T12:52:00.727",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2025-06-16T22:15:44.517",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link EAP120 router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the login fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link EAP120 router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de inicio de sesi\u00f3n."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:eap120_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "07561227-B7ED-4931-A792-DC5F3EFC60BC"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:eap120:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "117B617D-360F-4FF9-8785-1A2CDE1B0EB6"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29648",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,98 +2,15 @@
|
||||
"id": "CVE-2025-29649",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.563",
|
||||
"lastModified": "2025-04-24T12:51:37.493",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2025-06-16T22:15:55.553",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link TL-WR840N router s login dashboard (version 1.0), allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link TL-WR840N router s login dashboard (versi\u00f3n 1.0), que permite a un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wr840n_firmware:1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "4F2E1762-B468-46CA-A3E9-44B4A21EC437"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wr840n:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AF3078F3-4CD5-4157-9A2D-7E338B6C7058"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29649",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,98 +2,15 @@
|
||||
"id": "CVE-2025-29650",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.663",
|
||||
"lastModified": "2025-04-24T13:44:23.137",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2025-06-16T22:16:04.667",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7200 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:m7200_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "00D5463C-58B7-400E-9B73-37C7036FE252"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:m7200:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "41438D26-F2D6-4DFC-B13C-A7458CE8F22C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29650",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,98 +2,15 @@
|
||||
"id": "CVE-2025-29651",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.760",
|
||||
"lastModified": "2025-04-24T14:56:11.510",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2025-06-16T22:16:13.750",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 170623 Rel.1022n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7650 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 170623 Rel.1022n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:m7650_firmware:1.0.7:build_170623_rel.1022n:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "425955C0-305B-4AFD-ADC0-34C6E469559C"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:m7650:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "04ED6964-77D4-48AD-8CA4-0FCA62BB3189"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29651",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,98 +2,15 @@
|
||||
"id": "CVE-2025-29652",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.860",
|
||||
"lastModified": "2025-04-24T13:56:26.960",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"tags": [
|
||||
"disputed"
|
||||
]
|
||||
}
|
||||
],
|
||||
"lastModified": "2025-06-16T22:16:22.843",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.7 Build 180127 Rel.55998n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields. NOTE: this is disputed because the issue can only be reproduced on a supplier-provided emulator, where access control is intentionally absent for ease of functional testing."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7000 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.7 Build 180127 Rel.55998n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:m7000_firmware:1.0.7:build_180127_rel.55998n:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "AC7C3EA6-A860-4814-A424-7332FDE625F5"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:m7000:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F661A5EA-62E0-4073-946F-D279BC385453"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29652",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
@ -2,91 +2,15 @@
|
||||
"id": "CVE-2025-29653",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-04-16T20:15:17.963",
|
||||
"lastModified": "2025-04-24T13:54:34.550",
|
||||
"vulnStatus": "Analyzed",
|
||||
"lastModified": "2025-06-16T22:16:31.940",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "SQL Injection vulnerability exists in the TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware Version: 1.0.2 Build 170306 Rel.1015n, allowing an unauthenticated attacker to inject malicious SQL statements via the username and password fields."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "Existe una vulnerabilidad de inyecci\u00f3n SQL en TP-Link M7450 4G LTE Mobile Wi-Fi Router Firmware versi\u00f3n: 1.0.2 Build 170306 Rel.1015n, lo que permite que un atacante no autenticado inyecte sentencias SQL maliciosas a trav\u00e9s de los campos de nombre de usuario y contrase\u00f1a."
|
||||
"value": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:m7450_firmware:1.0.2:build_170306_rel.1015n:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FC5FA2EA-3A0C-4E80-B499-1E97DEA3B955"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:m7450:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "F2F6BAE4-33F8-44D7-8FCF-C7D9AA436BCE"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/TheVeteran1/Vulnerability-Research/blob/main/CVE-2025-29653",
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
"metrics": {},
|
||||
"references": []
|
||||
}
|
53
CVE-2025/CVE-2025-432xx/CVE-2025-43200.json
Normal file
53
CVE-2025/CVE-2025-432xx/CVE-2025-43200.json
Normal file
@ -0,0 +1,53 @@
|
||||
{
|
||||
"id": "CVE-2025-43200",
|
||||
"sourceIdentifier": "product-security@apple.com",
|
||||
"published": "2025-06-16T22:16:41.120",
|
||||
"lastModified": "2025-06-16T22:16:41.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "This issue was addressed with improved checks. This issue is fixed in watchOS 11.3.1, macOS Ventura 13.7.4, iOS 15.8.4 and iPadOS 15.8.4, iOS 16.7.11 and iPadOS 16.7.11, iPadOS 17.7.5, visionOS 2.3.1, macOS Sequoia 15.3.1, iOS 18.3.1 and iPadOS 18.3.1, macOS Sonoma 14.7.4. A logic issue existed when processing a maliciously crafted photo or video shared via an iCloud Link. Apple is aware of a report that this issue may have been exploited in an extremely sophisticated attack against specific targeted individuals."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122173",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122174",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122345",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122346",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122900",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122901",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122902",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122903",
|
||||
"source": "product-security@apple.com"
|
||||
},
|
||||
{
|
||||
"url": "https://support.apple.com/en-us/122904",
|
||||
"source": "product-security@apple.com"
|
||||
}
|
||||
]
|
||||
}
|
86
CVE-2025/CVE-2025-489xx/CVE-2025-48992.json
Normal file
86
CVE-2025/CVE-2025-489xx/CVE-2025-48992.json
Normal file
@ -0,0 +1,86 @@
|
||||
{
|
||||
"id": "CVE-2025-48992",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-06-16T23:15:21.827",
|
||||
"lastModified": "2025-06-16T23:15:21.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Group-Office is an enterprise customer relationship management and groupware tool. Prior to versions 6.8.123 and 25.0.27, a stored and blind cross-site scripting (XSS) vulnerability exists in the Name Field of the user profile. A malicious attacker can change their name to a javascript payload, which is executed when a user adds the malicious user to their Synchronization > Address books. This issue has been patched in versions 6.8.123 and 25.0.27."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "HIGH",
|
||||
"subIntegrityImpact": "HIGH",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-87"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/commit/2e3695db9cdef1da7a9d754ff4d98f49f6924e2d",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Intermesh/groupoffice/security/advisories/GHSA-j35g-q5mc-jwgp",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
153
CVE-2025/CVE-2025-61xx/CVE-2025-6140.json
Normal file
153
CVE-2025/CVE-2025-61xx/CVE-2025-6140.json
Normal file
@ -0,0 +1,153 @@
|
||||
{
|
||||
"id": "CVE-2025-6140",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T22:16:41.250",
|
||||
"lastModified": "2025-06-16T22:16:41.250",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as problematic, was found in spdlog up to 1.15.1. This affects the function scoped_padder in the library include/spdlog/pattern_formatter-inl.h. The manipulation leads to resource consumption. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.15.2 is able to address this issue. The identifier of the patch is 10320184df1eb4638e253a34b1eb44ce78954094. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-404"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/gabime/spdlog/commit/10320184df1eb4638e253a34b1eb44ce78954094",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gabime/spdlog/issues/3360",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gabime/spdlog/issues/3360#issuecomment-2729579422",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/gabime/spdlog/releases/tag/v1.15.2",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312609",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312609",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.592999",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
157
CVE-2025/CVE-2025-61xx/CVE-2025-6141.json
Normal file
157
CVE-2025/CVE-2025-61xx/CVE-2025-6141.json
Normal file
@ -0,0 +1,157 @@
|
||||
{
|
||||
"id": "CVE-2025-6141",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T22:16:41.527",
|
||||
"lastModified": "2025-06-16T22:16:41.527",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in GNU ncurses up to 6.5-20250322 and classified as problematic. This vulnerability affects the function postprocess_termcap of the file tinfo/parse_entry.c. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. Upgrading to version 6.5-20250329 is able to address this issue. It is recommended to upgrade the affected component."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 3.3,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P",
|
||||
"baseScore": 1.7,
|
||||
"accessVector": "LOCAL",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://invisible-island.net/ncurses/NEWS.html#index-t20250329",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00107.html",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00109.html",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://lists.gnu.org/archive/html/bug-ncurses/2025-03/msg00114.html",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312610",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312610",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593000",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.gnu.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
137
CVE-2025/CVE-2025-61xx/CVE-2025-6142.json
Normal file
137
CVE-2025/CVE-2025-61xx/CVE-2025-6142.json
Normal file
@ -0,0 +1,137 @@
|
||||
{
|
||||
"id": "CVE-2025-6142",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T22:16:41.710",
|
||||
"lastModified": "2025-06-16T22:16:41.710",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Intera InHire up to 20250530. It has been declared as critical. Affected by this vulnerability is an unknown functionality. The manipulation of the argument 29chcotoo9 leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://drive.google.com/file/d/1-doSYzFeLaKtd_b6RmpBtZ5qtsvu4gYI/view?usp=sharing",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312613",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312613",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.587665",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-61xx/CVE-2025-6143.json
Normal file
145
CVE-2025/CVE-2025-61xx/CVE-2025-6143.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-6143",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T23:15:22.500",
|
||||
"lastModified": "2025-06-16T23:15:22.500",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability, which was classified as critical, was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/13.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312618",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312618",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593004",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-61xx/CVE-2025-6144.json
Normal file
149
CVE-2025/CVE-2025-61xx/CVE-2025-6144.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6144",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T23:15:22.683",
|
||||
"lastModified": "2025-06-16T23:15:22.683",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability has been found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formSysCmd of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/688/1.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/688/1.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312619",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312619",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593009",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
149
CVE-2025/CVE-2025-61xx/CVE-2025-6145.json
Normal file
149
CVE-2025/CVE-2025-61xx/CVE-2025-6145.json
Normal file
@ -0,0 +1,149 @@
|
||||
{
|
||||
"id": "CVE-2025-6145",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-16T23:15:22.863",
|
||||
"lastModified": "2025-06-16T23:15:22.863",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in TOTOLINK EX1200T 4.1.2cu.5232_B20210713 and classified as critical. Affected by this issue is some unknown functionality of the file /boafrm/formSysLog of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/688/2.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/awindog/cve/blob/main/688/2.md#poc",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.312620",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.312620",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.593011",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.totolink.net/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
58
README.md
58
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-16T22:00:19.875634+00:00
|
||||
2025-06-16T23:55:19.871254+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-16T21:45:19.070000+00:00
|
||||
2025-06-16T23:15:22.863000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,53 +33,35 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
298054
|
||||
298063
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `9`
|
||||
|
||||
- [CVE-2025-32798](CVE-2025/CVE-2025-327xx/CVE-2025-32798.json) (`2025-06-16T20:15:27.200`)
|
||||
- [CVE-2025-32799](CVE-2025/CVE-2025-327xx/CVE-2025-32799.json) (`2025-06-16T21:15:23.683`)
|
||||
- [CVE-2025-32800](CVE-2025/CVE-2025-328xx/CVE-2025-32800.json) (`2025-06-16T21:15:23.847`)
|
||||
- [CVE-2025-47951](CVE-2025/CVE-2025-479xx/CVE-2025-47951.json) (`2025-06-16T21:15:24.010`)
|
||||
- [CVE-2025-49134](CVE-2025/CVE-2025-491xx/CVE-2025-49134.json) (`2025-06-16T21:15:24.167`)
|
||||
- [CVE-2025-6136](CVE-2025/CVE-2025-61xx/CVE-2025-6136.json) (`2025-06-16T20:15:27.863`)
|
||||
- [CVE-2025-6137](CVE-2025/CVE-2025-61xx/CVE-2025-6137.json) (`2025-06-16T20:15:28.040`)
|
||||
- [CVE-2025-6138](CVE-2025/CVE-2025-61xx/CVE-2025-6138.json) (`2025-06-16T21:15:24.323`)
|
||||
- [CVE-2025-6139](CVE-2025/CVE-2025-61xx/CVE-2025-6139.json) (`2025-06-16T21:15:24.513`)
|
||||
- [CVE-2025-27587](CVE-2025/CVE-2025-275xx/CVE-2025-27587.json) (`2025-06-16T22:15:44.093`)
|
||||
- [CVE-2025-43200](CVE-2025/CVE-2025-432xx/CVE-2025-43200.json) (`2025-06-16T22:16:41.120`)
|
||||
- [CVE-2025-48992](CVE-2025/CVE-2025-489xx/CVE-2025-48992.json) (`2025-06-16T23:15:21.827`)
|
||||
- [CVE-2025-6140](CVE-2025/CVE-2025-61xx/CVE-2025-6140.json) (`2025-06-16T22:16:41.250`)
|
||||
- [CVE-2025-6141](CVE-2025/CVE-2025-61xx/CVE-2025-6141.json) (`2025-06-16T22:16:41.527`)
|
||||
- [CVE-2025-6142](CVE-2025/CVE-2025-61xx/CVE-2025-6142.json) (`2025-06-16T22:16:41.710`)
|
||||
- [CVE-2025-6143](CVE-2025/CVE-2025-61xx/CVE-2025-6143.json) (`2025-06-16T23:15:22.500`)
|
||||
- [CVE-2025-6144](CVE-2025/CVE-2025-61xx/CVE-2025-6144.json) (`2025-06-16T23:15:22.683`)
|
||||
- [CVE-2025-6145](CVE-2025/CVE-2025-61xx/CVE-2025-6145.json) (`2025-06-16T23:15:22.863`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `44`
|
||||
Recently modified CVEs: `7`
|
||||
|
||||
- [CVE-2024-38875](CVE-2024/CVE-2024-388xx/CVE-2024-38875.json) (`2025-06-16T21:39:39.120`)
|
||||
- [CVE-2024-39329](CVE-2024/CVE-2024-393xx/CVE-2024-39329.json) (`2025-06-16T21:39:25.910`)
|
||||
- [CVE-2024-39330](CVE-2024/CVE-2024-393xx/CVE-2024-39330.json) (`2025-06-16T21:39:07.157`)
|
||||
- [CVE-2024-39614](CVE-2024/CVE-2024-396xx/CVE-2024-39614.json) (`2025-06-16T21:38:55.470`)
|
||||
- [CVE-2025-29573](CVE-2025/CVE-2025-295xx/CVE-2025-29573.json) (`2025-06-16T20:19:43.233`)
|
||||
- [CVE-2025-30317](CVE-2025/CVE-2025-303xx/CVE-2025-30317.json) (`2025-06-16T21:27:49.447`)
|
||||
- [CVE-2025-30321](CVE-2025/CVE-2025-303xx/CVE-2025-30321.json) (`2025-06-16T21:32:02.783`)
|
||||
- [CVE-2025-3638](CVE-2025/CVE-2025-36xx/CVE-2025-3638.json) (`2025-06-16T21:03:13.033`)
|
||||
- [CVE-2025-43558](CVE-2025/CVE-2025-435xx/CVE-2025-43558.json) (`2025-06-16T21:31:49.540`)
|
||||
- [CVE-2025-43589](CVE-2025/CVE-2025-435xx/CVE-2025-43589.json) (`2025-06-16T21:31:39.580`)
|
||||
- [CVE-2025-43590](CVE-2025/CVE-2025-435xx/CVE-2025-43590.json) (`2025-06-16T21:31:30.193`)
|
||||
- [CVE-2025-43593](CVE-2025/CVE-2025-435xx/CVE-2025-43593.json) (`2025-06-16T21:31:20.630`)
|
||||
- [CVE-2025-45236](CVE-2025/CVE-2025-452xx/CVE-2025-45236.json) (`2025-06-16T20:36:27.817`)
|
||||
- [CVE-2025-45237](CVE-2025/CVE-2025-452xx/CVE-2025-45237.json) (`2025-06-16T20:35:29.437`)
|
||||
- [CVE-2025-45607](CVE-2025/CVE-2025-456xx/CVE-2025-45607.json) (`2025-06-16T20:17:27.537`)
|
||||
- [CVE-2025-45612](CVE-2025/CVE-2025-456xx/CVE-2025-45612.json) (`2025-06-16T20:00:50.837`)
|
||||
- [CVE-2025-46654](CVE-2025/CVE-2025-466xx/CVE-2025-46654.json) (`2025-06-16T21:00:11.573`)
|
||||
- [CVE-2025-47104](CVE-2025/CVE-2025-471xx/CVE-2025-47104.json) (`2025-06-16T21:31:11.607`)
|
||||
- [CVE-2025-47105](CVE-2025/CVE-2025-471xx/CVE-2025-47105.json) (`2025-06-16T21:30:52.307`)
|
||||
- [CVE-2025-47106](CVE-2025/CVE-2025-471xx/CVE-2025-47106.json) (`2025-06-16T21:30:33.830`)
|
||||
- [CVE-2025-4748](CVE-2025/CVE-2025-47xx/CVE-2025-4748.json) (`2025-06-16T20:15:27.750`)
|
||||
- [CVE-2025-48976](CVE-2025/CVE-2025-489xx/CVE-2025-48976.json) (`2025-06-16T20:15:27.350`)
|
||||
- [CVE-2025-48988](CVE-2025/CVE-2025-489xx/CVE-2025-48988.json) (`2025-06-16T20:15:27.447`)
|
||||
- [CVE-2025-49124](CVE-2025/CVE-2025-491xx/CVE-2025-49124.json) (`2025-06-16T20:15:27.557`)
|
||||
- [CVE-2025-49125](CVE-2025/CVE-2025-491xx/CVE-2025-49125.json) (`2025-06-16T20:15:27.650`)
|
||||
- [CVE-2024-57050](CVE-2024/CVE-2024-570xx/CVE-2024-57050.json) (`2025-06-16T22:15:20.670`)
|
||||
- [CVE-2025-29648](CVE-2025/CVE-2025-296xx/CVE-2025-29648.json) (`2025-06-16T22:15:44.517`)
|
||||
- [CVE-2025-29649](CVE-2025/CVE-2025-296xx/CVE-2025-29649.json) (`2025-06-16T22:15:55.553`)
|
||||
- [CVE-2025-29650](CVE-2025/CVE-2025-296xx/CVE-2025-29650.json) (`2025-06-16T22:16:04.667`)
|
||||
- [CVE-2025-29651](CVE-2025/CVE-2025-296xx/CVE-2025-29651.json) (`2025-06-16T22:16:13.750`)
|
||||
- [CVE-2025-29652](CVE-2025/CVE-2025-296xx/CVE-2025-29652.json) (`2025-06-16T22:16:22.843`)
|
||||
- [CVE-2025-29653](CVE-2025/CVE-2025-296xx/CVE-2025-29653.json) (`2025-06-16T22:16:31.940`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
129
_state.csv
129
_state.csv
@ -39251,7 +39251,7 @@ CVE-2009-2626,0,0,7d808c3b337b3dd179c5c83f2afaaa2086056b848ea5fcca29f5344102d32c
|
||||
CVE-2009-2627,0,0,694ff522c2c2384ac2ef84c6917a414a152aa0809bdf43a8e6b69444ebb5c6b5,2025-04-09T00:30:58.490000
|
||||
CVE-2009-2628,0,0,0d71b5b55b2a76adc0a40b01b856df4d643748d69e1b6d2ddf74be2c3b018f04,2025-04-09T00:30:58.490000
|
||||
CVE-2009-2629,0,0,c269a1546ec3551cc7c6dd410202f6e170c9edb7369c16ab4c02d0a95dc3053c,2025-04-09T00:30:58.490000
|
||||
CVE-2009-2631,0,1,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000
|
||||
CVE-2009-2631,0,0,f7a2ab6b9574f53797105cc930ffc84b38334d110f2e5a6043983af93bb29e9a,2025-06-16T21:15:22.113000
|
||||
CVE-2009-2632,0,0,d4abe203f8fe18c26b468bad7eb2075a45826c502661df98d8df1ca946af1681,2025-04-09T00:30:58.490000
|
||||
CVE-2009-2633,0,0,57a10f8a0370e765cd5c4db6177ea6709b0ea6b7921354cc00d8630e517f7f07,2025-04-09T00:30:58.490000
|
||||
CVE-2009-2634,0,0,fd4588f61c55fcd0997f4cdc4d78e1193050d47ff58fe3241f247ad7b7d80505,2025-04-09T00:30:58.490000
|
||||
@ -184979,7 +184979,7 @@ CVE-2021-43579,0,0,7795b4717e11fd2641e463a49231835fce3ea5cb7eb5fb562ec7490a62052
|
||||
CVE-2021-4358,0,0,b2ea1964b0aaec46c7cef84d55058430bfdf214bac87a1e8b460a29a79125446,2024-11-21T06:37:29.957000
|
||||
CVE-2021-43581,0,0,8108c5b39f7ca8239e11c52952d79ed5aa76af3ac0ce5532e18c301d3825a99a,2024-11-21T06:29:29.140000
|
||||
CVE-2021-43582,0,0,43a81bf863d57ab551e8731ccba32f8e965bca39a894587dff864e90e5bc9264,2024-11-21T06:29:29.293000
|
||||
CVE-2021-43584,0,1,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000
|
||||
CVE-2021-43584,0,0,aee18099c737c3e57ba9a727a11234e9347975ec334898fed2010c39f6d286b6,2025-06-16T20:15:23.203000
|
||||
CVE-2021-43587,0,0,7fbb5ce8b85874af575c4d094206bbb97a641f3bf8bfdd530f385e73f835079d,2024-11-21T06:29:29.623000
|
||||
CVE-2021-43588,0,0,5fa55ef971ca4fd6c419512879e9914d923150440b0a909438ef8a8a7aa160f6,2024-11-21T06:29:29.767000
|
||||
CVE-2021-43589,0,0,1be5e4212f6cd5c9a99dae98461249f5c0dec0cc80b669d16628ab1cd22c953f,2024-11-21T06:29:29.913000
|
||||
@ -226942,7 +226942,7 @@ CVE-2023-32883,0,0,18723e3d230f195bc0a868976daaa68e0e09f50ea939aff9a7f50817007d3
|
||||
CVE-2023-32884,0,0,badab0b564d8b0671ccccd8220cc21ebd691ade4e70a70e9932ae240cc9e9b1d,2025-06-03T15:15:31.293000
|
||||
CVE-2023-32885,0,0,e6ad4cab5f683cd31277c541f39b573a4cab547e3c7cbe67334cd94792821ed1,2025-04-17T19:15:55.867000
|
||||
CVE-2023-32886,0,0,b130264fbebddf30b7785f9804d4b6984dea839b524cc40be854e297927fa567,2025-06-03T15:15:31.613000
|
||||
CVE-2023-32887,0,1,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000
|
||||
CVE-2023-32887,0,0,8dfcd3281dda4dc3932cdb8ff5579af8f4b86833200562954b8c6031c8e6fd07,2025-06-16T20:15:24.233000
|
||||
CVE-2023-32888,0,0,752087afa621d16e61d32ee9c8700b21050b1a9343589eda4eef2d1b19855fd8,2025-05-16T18:16:01.257000
|
||||
CVE-2023-32889,0,0,e2d8dfe153faa54fe19d590087d31f3105782c0ca961382255d5f028954e56ad,2024-11-21T08:04:16.780000
|
||||
CVE-2023-3289,0,0,8443b25ebddb1823f9095d1a039ea811ffd9d30f62068eb82d3e7c0037047f18,2024-11-21T08:16:56.233000
|
||||
@ -227436,7 +227436,7 @@ CVE-2023-33533,0,0,3c4dc916ce0e09629a4d1fe9abe3d09a4054678118c9121ca7e5c0b829b1c
|
||||
CVE-2023-33534,0,0,375224b30005c5c6b4df976c11ab08ed3b921dbd5d50ac7db6447c43e9441aad,2024-11-21T08:05:41.057000
|
||||
CVE-2023-33536,0,0,cb50e37274d092888d1fe39ac87a363acf8eaa47d7301bb2b831795e57af7d9d,2025-01-07T16:15:31.153000
|
||||
CVE-2023-33537,0,0,e4de1c536060f7cf7b6b601cdcb55c69fae53fc6ccc20322c7e5aead8394ad75,2025-01-07T16:15:31.423000
|
||||
CVE-2023-33538,0,1,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000
|
||||
CVE-2023-33538,0,0,7ca40e5c1717f6c5efc4d7d982273e5e5e1e4ca9a388f3ac080b69eefef8d862,2025-06-16T21:15:23.267000
|
||||
CVE-2023-3354,0,0,c1971a8d35c84792a7e3b4b69170665e207a3bb365fff75d5a707072047933e4,2024-11-21T08:17:05.117000
|
||||
CVE-2023-33544,0,0,ea770ac3095100c0cf3dfef2c91d44acce796d4bc92ed10e70a1e80795446c94,2025-01-09T17:15:09.997000
|
||||
CVE-2023-33546,0,0,9e82aede766f4b9b701714d917a2868af3b3571a49bd4b295d6aba2bb98c278a,2024-11-21T08:05:41.850000
|
||||
@ -229008,7 +229008,7 @@ CVE-2023-35830,0,0,f9ec7bc37d75084b8f9adb19576e522ba0ca1eac41387899bac0f91ba3a89
|
||||
CVE-2023-35833,0,0,c1bf8e993bff3c15ea6b1d5ea82e7182e9df63907a88f295064618c4d1f070ba,2024-11-21T08:08:46.997000
|
||||
CVE-2023-35835,0,0,c472cfaca014db3ca099e3bd7467ed6b0670670172a0e8f336efd51e4092fc62,2025-05-30T15:15:22.107000
|
||||
CVE-2023-35836,0,0,acaaf0e5111795f0a1deca0b38b68c171a0c114afd926ca0ef4711f965e3b753,2025-06-11T17:15:31.923000
|
||||
CVE-2023-35837,0,1,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000
|
||||
CVE-2023-35837,0,0,5341147c990d2ce4179daea5262cd87a6eeb4142e4704a8f7a8f53690a02c15b,2025-06-16T20:15:24.593000
|
||||
CVE-2023-35838,0,0,183f211cfdb5c0b95769b09aaa0c425385e59381d55642b1813c42fff31c8a36,2024-11-21T08:08:47.637000
|
||||
CVE-2023-35839,0,0,656f78752e563a12ede3b5803be9c4748192ecddd9db4c5bb9648851053668b6,2024-11-21T08:08:47.797000
|
||||
CVE-2023-3584,0,0,db20d2c7ac289598080cfe7af369da1c9e2f79983a8f4444c3d60e81d4ca7c03,2024-11-21T08:17:36.207000
|
||||
@ -231359,7 +231359,7 @@ CVE-2023-38607,0,0,2ce363c1d9b97cb3747e23823fba83b3f8ee2adfbf120a92c7b78eb51b356
|
||||
CVE-2023-38608,0,0,b71d5a2655ed04c8dddf465e235f7b0639be5f023e883b9a5ba1758064cc8e3b,2024-11-21T08:13:55.913000
|
||||
CVE-2023-38609,0,0,6dc79f9d60fa5646ad0e783262026af7df43cd2e155e3927d10dda9c9455089f,2024-11-21T08:13:56.030000
|
||||
CVE-2023-3861,0,0,256bdf9cd413cbfa70ed4e6a0b9211792976947f22c0d0ba6729c1ba3a66e3fc,2024-11-21T08:18:14.550000
|
||||
CVE-2023-38610,0,1,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000
|
||||
CVE-2023-38610,0,0,63b66d820b7fe613a2f9461038899a1b6f2132c01144b878382779fbc9cac559,2025-06-16T20:15:24.867000
|
||||
CVE-2023-38611,0,0,0c21e67a52c96f626024280838ea08bd20ff315d2265b8b2d16822974fdb8823,2024-11-21T08:13:56.267000
|
||||
CVE-2023-38612,0,0,dc7d175e74c392b2fa34b19b326d494d7537b9d88be3ebe3dbd10253f9d4194b,2025-06-03T15:15:38.607000
|
||||
CVE-2023-38614,0,0,62fbad3f38dd4f4036a676d9c766532164d35e9d276fb55f22cda5a23b82d493,2025-04-25T16:55:31.270000
|
||||
@ -234732,7 +234732,7 @@ CVE-2023-42882,0,0,52d3d6e63624b766645b42f6de5717aa4cf8dfd75908cc909fde080396178
|
||||
CVE-2023-42883,0,0,f5e872895d15f38cbd7c669092eb1e3aea886639119d160af848a76f82a5203f,2024-11-21T08:23:25.203000
|
||||
CVE-2023-42884,0,0,2e5a8b2139dbb918dbc0af76f59335eac704130dc73878de8da29830077c7be6,2025-05-27T15:15:30.620000
|
||||
CVE-2023-42886,0,0,c15407d84b2542d842f4506c0cd71a04ba67406423e4c036a717e97c9a72bbe5,2024-11-21T08:23:25.483000
|
||||
CVE-2023-42887,0,1,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000
|
||||
CVE-2023-42887,0,0,d77eb16ad80e94e32082e9331c2233a5ec8fb4cbfa1d5e9af956fdf704240652,2025-06-16T20:15:25.120000
|
||||
CVE-2023-42888,0,0,53dcb8ac8f380ce3afe4718b34f84401ac21952dd00fc8c845621c41239cbfc5,2025-06-16T19:15:23.777000
|
||||
CVE-2023-42889,0,0,a974df235eb2d3c4ac74c2469929bae42468dda315bde0f114e922e68df14623,2024-12-09T17:10:23.580000
|
||||
CVE-2023-4289,0,0,84ea1a015248ce44ce4d95acdcd6cce0ce0aea730d50a3bfd933c2196769c933,2025-04-23T17:16:43.033000
|
||||
@ -237493,7 +237493,7 @@ CVE-2023-46824,0,0,986b06bf57d50728dbf5f80c95830764c980384db658e4991e6c4a53a212b
|
||||
CVE-2023-4683,0,0,76ee54862a2b6294ce73a6e0f8dddb60dfaac815f4119e8c25a08426a72a9401,2024-11-21T08:35:40.860000
|
||||
CVE-2023-46835,0,0,e8b24f3a833cecb5e26772221ee94c6e7de234b62344eeb1bf8a83632146bc3e,2024-11-21T08:29:23.593000
|
||||
CVE-2023-46836,0,0,e0785f3778eb579729a1be636dffebd4a5f98f6ffcf042af2ec5bc63df61c452,2025-06-03T15:15:42.700000
|
||||
CVE-2023-46837,0,1,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000
|
||||
CVE-2023-46837,0,0,8a79759f48a05b77b31d6ec660aee12324603d7f402cca4e5c53f0d954268f7e,2025-06-16T20:15:25.510000
|
||||
CVE-2023-46838,0,0,f1babf526c3f5839d278fd86f9852b1cd10fd3733391c516fd9386abab96da86,2025-06-02T19:15:21.687000
|
||||
CVE-2023-46839,0,0,110c4574be648ab625e9ba9b9f041f367f3cfe8e1328db16490d89d1854556ab,2024-11-21T20:15:36.450000
|
||||
CVE-2023-46840,0,0,35101892971cbf6355ae8df6a82236e4f3dffa9cecb80f1c3349b445a8ac7edf,2024-11-21T08:29:24.200000
|
||||
@ -239448,7 +239448,7 @@ CVE-2023-4942,0,0,3c7a5d772b22681bef3ed3e6c9496e43c134a6f368f32a6bae14ed4d3847ad
|
||||
CVE-2023-49424,0,0,d2f93e70c9be16993bbf1d8c7906db8335f897b831e85223bdf76f20c47bff6d,2024-11-21T08:33:22.383000
|
||||
CVE-2023-49425,0,0,41aec47a68b046d68f3afc2d29f4e86911729f41a2d38db56112b7fe298a8b42,2024-11-21T08:33:22.637000
|
||||
CVE-2023-49426,0,0,24ccb283dd811b7bbe9dac5994304963d40e99b04308ac6657fd7508af2d4466,2024-11-21T08:33:22.793000
|
||||
CVE-2023-49427,0,1,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000
|
||||
CVE-2023-49427,0,0,9e3d25715006745095ecc3c2d768f83e63e5c485dd28d50aa07bf323c9c27727,2025-06-16T20:15:25.787000
|
||||
CVE-2023-49428,0,0,868063d4b88a113eac2ad7dfd7a983c90c1888bd4c0fd88457e82c182b022090,2024-11-21T08:33:23.093000
|
||||
CVE-2023-49429,0,0,2e5afa3b83b44af2a51b62ff5369b8e7b42a100071b9f2a98c76a7854b28d0f5,2024-11-21T08:33:23.327000
|
||||
CVE-2023-4943,0,0,1a8987516543f87ce2b5b23583241ad5040c167598f6c1afaf4a0e38f4c156b6,2024-11-21T08:36:19.200000
|
||||
@ -239509,7 +239509,7 @@ CVE-2023-49545,0,0,47f3429e08f2c293fa1cc12b36624cb4d5f68d2ea9bef0685b799dd88a7d2
|
||||
CVE-2023-49546,0,0,e46a5d6ba9f928f5ccce6110cf05864cdb8c95510d303e32eb9d6ba14881858a,2025-03-28T14:32:41.870000
|
||||
CVE-2023-49547,0,0,62a6f6e3b035cf2acd18665693229ea22aac788ca296ee7a229b4a2dce9eae2c,2025-03-28T14:32:37.313000
|
||||
CVE-2023-49548,0,0,e74378dd5804e4ba9b3280e9ef7d96db58590c88b07392a11d8977286e3b39c9,2025-03-28T14:32:32.823000
|
||||
CVE-2023-49549,0,1,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000
|
||||
CVE-2023-49549,0,0,e250802eda8c7c4fca3ddf77ab1de03a2428108ca7705eb394a1cef85c7a5cac,2025-06-16T20:15:25.967000
|
||||
CVE-2023-49550,0,0,2c81aa1b1a990754ef879c26f0a6ee754ede0d23bfa96a1085f14891646cb258,2025-05-16T18:16:01.490000
|
||||
CVE-2023-49551,0,0,ed28c559f9ba8d4b8aae8d2d4e401c8834ea212cf18214e50de777924bce03bc,2024-11-21T08:33:32.447000
|
||||
CVE-2023-49552,0,0,ae4e673718d2ece6c9d20818d4dbdbed3840be8be0432a45b27d72d6dac502e9,2025-04-17T19:15:57.020000
|
||||
@ -251587,7 +251587,7 @@ CVE-2024-22069,0,0,2589bf56dffdf4ef29eab8695fc269ca81c308524ec8bece7dc0674ae5676
|
||||
CVE-2024-2207,0,0,8ea6ed342e7acaef1c3218ac0166f216837d9139fa465e9658495103208688f2,2024-11-13T17:01:16.850000
|
||||
CVE-2024-22074,0,0,8ce1416a2a2c2062f8a4515755c7506139d9261992e4df0985ed7bb84eb5f26f,2025-03-18T21:15:23.753000
|
||||
CVE-2024-22075,0,0,6dc0dd67a1731f80576b4eb68aefe5391b243a762942cc9a93f563c5e6243aa8,2025-06-05T17:15:27.147000
|
||||
CVE-2024-22076,0,1,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000
|
||||
CVE-2024-22076,0,0,8df17a9e5da6687644592eb13f6108982f6808afa0e0ef5f67385a3a657b4a8b,2025-06-16T20:15:26.483000
|
||||
CVE-2024-22077,0,0,8d56db529de03b85ebd97acb9333cc2ed26899ac306cf0acec7262d040dc588a,2025-04-16T18:20:36.067000
|
||||
CVE-2024-22078,0,0,46ee7f1461ed88577c888e3c7fb500abb803e96986ad6800d0492878c6e910de,2025-04-16T18:20:45.887000
|
||||
CVE-2024-22079,0,0,954368bce62047e9105fd47ef1997588788142259ffb5d52007fda3ef1f622d2,2025-04-16T17:28:31.577000
|
||||
@ -252836,7 +252836,7 @@ CVE-2024-23736,0,0,79df2399a819d34fa678176aa1fa937f65e00863f268b4896e44d2087292c
|
||||
CVE-2024-23737,0,0,540efa9ee00efd37944f43ad1656f3b195cf720184caf65cc0e057840cf72c9f,2025-03-18T15:15:47.677000
|
||||
CVE-2024-23738,0,0,194fa187167961d4a7ea8823665a156c16bef0fdb38b3bf079adecd3590504b6,2024-11-21T08:58:17.097000
|
||||
CVE-2024-23739,0,0,5fca16dbc725b4436fe41f1f025ceb46fcd84b9811e3b3737739d8cf70da2c24,2025-05-29T16:15:35.657000
|
||||
CVE-2024-23740,0,1,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000
|
||||
CVE-2024-23740,0,0,7e5c8dfa413b11f7c6b8966d5cdf8fba59dd96354b3012a055f055437514c5c2,2025-06-16T20:15:26.773000
|
||||
CVE-2024-23741,0,0,cec6fa87499b6b24bec1cad23d019ade6552bf7a67f18abab2c2cdd15debb8a8,2025-06-03T19:15:38.503000
|
||||
CVE-2024-23742,0,0,60ce68668ba096e31d7358004d46252e5708dd5c7e16e43273c83b3627661a67,2024-11-21T08:58:17.843000
|
||||
CVE-2024-23743,0,0,c4ab1516b8f8c866ff87e9e1f54df21c028456ef3e5af76f499e4f60c61bd176,2024-11-21T08:58:18.013000
|
||||
@ -252997,7 +252997,7 @@ CVE-2024-23897,0,0,0228b7769e643d6ef05fe2a1c93c1e37d5e76065c0415e858a22d7bfa4a4e
|
||||
CVE-2024-23898,0,0,82cb86eeead29a41a26f8d43a27d3730988e662134d81188c8cd9708a0afbd78,2024-11-21T08:58:39.923000
|
||||
CVE-2024-23899,0,0,c9706debcbb25b54a6bc875acb0da336d766e313da3eea8e6dba91d19993d393,2025-06-04T15:15:23.400000
|
||||
CVE-2024-2390,0,0,3e848f25c0e6aca1cdb589d9d47a5535f56144364579a0cdbb3a8951c3252040,2024-11-21T09:09:39.010000
|
||||
CVE-2024-23900,0,1,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000
|
||||
CVE-2024-23900,0,0,a6b9a1972a90fef72a5600ab519c0ba9ad702d2ab57f30e71b6b1204e133411d,2025-06-16T20:15:26.943000
|
||||
CVE-2024-23901,0,0,49bcb4810f55c620816c3f0e594dbd0087699ab58f867f02a2b90676bb50fc8e,2025-05-30T15:15:39.480000
|
||||
CVE-2024-23902,0,0,c73fb2fe61aff6c4d1ed0d50eabeaf4ebe1700493a0b0e65d14e9f623c631a00,2025-05-30T15:15:39.690000
|
||||
CVE-2024-23903,0,0,7b6250a29108c7172c9048bcf6031f095bf8c0ec94ede321b93e4b7334b19c5a,2024-11-21T08:58:40.513000
|
||||
@ -260432,10 +260432,10 @@ CVE-2024-33773,0,0,034058b04ec93ca6c5edc4f174f8f4df83d661d3c6f32106b0dd0a828f81c
|
||||
CVE-2024-33774,0,0,52b770b7f333615156ba87f01b3cea08102d5ac65159461b358a36f647f81817,2025-05-21T14:42:59.237000
|
||||
CVE-2024-33775,0,0,bc597e520cb5802c10bcc9b429b021dd323dfc44b73d29075d59180bbe1246e2,2024-11-21T09:17:28.473000
|
||||
CVE-2024-3378,0,0,3baf56e09d4e512582bd0fad8896d230d93b23be4ed5cff61b2d7585ee2d7eb6,2024-11-21T09:29:29.847000
|
||||
CVE-2024-33780,0,1,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000
|
||||
CVE-2024-33781,0,1,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000
|
||||
CVE-2024-33782,0,1,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000
|
||||
CVE-2024-33783,0,1,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000
|
||||
CVE-2024-33780,0,0,72f8dfcd17909bf4c4e40b8b9d97596995a01e522f1d6a66162a9d0b9be0b1c0,2025-06-16T21:43:46.523000
|
||||
CVE-2024-33781,0,0,c40d097d94d2077cdf36976c1d28b87ecc6f883a65a6fbf3b75f94d98d4a21cb,2025-06-16T21:45:19.070000
|
||||
CVE-2024-33782,0,0,6b64e9146367652ab9d0440bbae07abbb6805bad95ffbd0bfc513af27b1f75aa,2025-06-16T21:45:07.900000
|
||||
CVE-2024-33783,0,0,ddffa27e7f8352f14c94ce31d27ab88b9353a70ef496ad7759efacfbe846cc71,2025-06-16T21:44:57.410000
|
||||
CVE-2024-33786,0,0,e1fb385dd8747da32e59253a9ffdea319cd8cdf03f2ca73f386cdc040ae670ac,2024-11-21T09:17:29.420000
|
||||
CVE-2024-33787,0,0,c49a88a43a707c2472f311af9a25d218e0650695fd55867c121db961e1d0f0a5,2024-11-21T09:17:29.593000
|
||||
CVE-2024-33788,0,0,d9e631d68ae2203702b7e708decaf819d9af63c25e4d0516bd7f43a761e5472b,2025-06-11T15:39:33.297000
|
||||
@ -262482,7 +262482,7 @@ CVE-2024-36295,0,0,3c7252205fab8389ff604c7c9e106ade710abf8f2bfb98226da656ac02a8a
|
||||
CVE-2024-3630,0,0,f45524cfa972af7bb2aff53d16e1a1b83041609f3cdf694c64819cdf2dc69047,2025-05-15T14:13:56.197000
|
||||
CVE-2024-36302,0,0,deb43f7268cf50cfed94b6e52be5d17bf5e3fbe5fd4ac51c48040db4fad24517,2025-05-29T20:20:31.940000
|
||||
CVE-2024-36303,0,0,b4111938d128c9565d65f07c6c56322c350c793e76b61c6854b8deaf71b80e05,2025-03-25T19:15:43.273000
|
||||
CVE-2024-36304,0,1,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000
|
||||
CVE-2024-36304,0,0,d672eea5735554868eaf67944f914e35802e168f9b1639f91b7e62cd1ea49d0e,2025-06-16T20:39:51.303000
|
||||
CVE-2024-36305,0,0,6cfa43069ee33e00c30d8fa3baead3036438742e2cae79ef30cc5d5dbaececa6,2025-03-14T02:15:14.077000
|
||||
CVE-2024-36306,0,0,64b14f3a298243574030100c00019e79538277aa5e06c79a15c2ad9d80646a47,2025-03-27T21:15:49.143000
|
||||
CVE-2024-36307,0,0,51d04be494c1bf54f841be1910d46ae0bb0c05ba90a56fa1759530c58c0d282e,2024-11-21T09:22:00.763000
|
||||
@ -263245,7 +263245,7 @@ CVE-2024-37285,0,0,e8cc98ed37c5497fbc9f92b308c74c874cd45490ed814f99ca1ead61244ae
|
||||
CVE-2024-37286,0,0,b4282d67550d8be06ee44ec1a1d7f9fab63643d7219a6e606e7fbac14d351953,2024-09-11T20:20:34.503000
|
||||
CVE-2024-37287,0,0,bcf9844fa80494210d104fcba352f6ab7b4fe100f45f4712e22ea47490257093,2024-08-22T13:33:12.477000
|
||||
CVE-2024-37288,0,0,3475a41b766be52846504d882c74d10d7a859ac0e1e60ce1dc0f10d4b0be8ed9,2024-09-16T13:29:06.023000
|
||||
CVE-2024-37289,0,1,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000
|
||||
CVE-2024-37289,0,0,dc4ae27da3f83405e806371f376c911569ffb7a98109a55edc534993293c5cf0,2025-06-16T21:06:18.303000
|
||||
CVE-2024-3729,0,0,65abd6654c17cc3e018ee04581d61c620b50a730e72a5a977007e121eb77577c,2025-06-05T20:27:10.677000
|
||||
CVE-2024-37293,0,0,2903e889cdd9f8be1e4ad48b17a596c07af5b20d5dcb6cbc56e38733c334d0fe,2024-11-21T09:23:32.963000
|
||||
CVE-2024-37294,0,0,a18f9fa103420601f5842225843a4bd9744b5082925500986dd9d320528b58ee,2024-11-21T09:23:33.123000
|
||||
@ -264668,7 +264668,7 @@ CVE-2024-38871,0,0,aaca5100a2da9e7b5d586a9692295acab5c9d0d91eda66f1860ebeb293e90
|
||||
CVE-2024-38872,0,0,47ea80c2905b4fcc836b85526e852dd82f3dd2956ab3cfac662114764141134e,2024-11-21T09:26:54.350000
|
||||
CVE-2024-38873,0,0,f2ba5412275048e33812e6176a6bf99f7df96dd1ba2fdb85068e1d077b18f066,2025-03-14T19:15:46.563000
|
||||
CVE-2024-38874,0,0,4355134bc7b65d4c8d4d874d6387ce19d5bde4ef04856b24cade7c33a3fdf2d3,2025-03-24T21:15:17.203000
|
||||
CVE-2024-38875,0,1,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000
|
||||
CVE-2024-38875,0,0,3e2807d526a7235cf7a075b444d5de74606e7a4a30ff4253080e5d38aed706d9,2025-06-16T21:39:39.120000
|
||||
CVE-2024-38876,0,0,382393d19d29340103e034acb95663867b49aa61928e9d6677747c9fde52b56e,2024-09-17T14:45:04.577000
|
||||
CVE-2024-38877,0,0,debb17cf13d15d92eae54014caecd50256c36b5032209a063b03638e2fcdc712,2024-09-20T23:35:04.073000
|
||||
CVE-2024-38878,0,0,0427331b5276e0aaf96c22ec915ceec80379648af41050ea650c27397769ec91,2024-09-17T15:50:41.117000
|
||||
@ -264914,9 +264914,9 @@ CVE-2024-39325,0,0,2d63785eb179762c856eea2ec86fc3efa2f2c067bbb8d9d3b6088dc568ae6
|
||||
CVE-2024-39326,0,0,36a1fd07341b99cf706e1069ff0c3c0b0e50f721ea59b85388d56c1cba535054,2024-11-21T09:27:28.167000
|
||||
CVE-2024-39327,0,0,f1d9ff16bae4b39dc8ccb82deff44aa6b991a127e7526d125d453464456f070b,2025-03-17T22:15:12.800000
|
||||
CVE-2024-39328,0,0,a00e9dbdd3e55bbdf614ef0ad9d1cf5f35291f7ebcc2655205839e9683cf46cf,2025-02-18T20:15:18.533000
|
||||
CVE-2024-39329,0,1,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000
|
||||
CVE-2024-39329,0,0,de737deeab9d30cf7e765f18930001367aea63c48a5b0cadca8e73ee0b3b6447,2025-06-16T21:39:25.910000
|
||||
CVE-2024-3933,0,0,df64f87f68ad2e15d5453047c42e0ed6cb0fa7b8af24502bdac6a78fb0f454aa,2025-01-09T18:00:53.140000
|
||||
CVE-2024-39330,0,1,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000
|
||||
CVE-2024-39330,0,0,45d64a165c5cbf4443561c4228c5e71c339abec3f4d6962bb9afcd5a3acf165a,2025-06-16T21:39:07.157000
|
||||
CVE-2024-39331,0,0,f95fa1eb69af148f11a765a1ec92c46fcf56bb3e58c0541443e234e8b15a8d12,2025-04-30T16:44:51.867000
|
||||
CVE-2024-39332,0,0,1f97303c758e324e488ed758e883e305ce844aaff7524d06547eb074ededefc3,2024-11-01T16:35:21.290000
|
||||
CVE-2024-39334,0,0,6658b5cdd9b8f471072648252d10cf59fe676c32ec2f32b00395e3dab4f56b09,2024-11-21T09:27:29.230000
|
||||
@ -265197,7 +265197,7 @@ CVE-2024-3961,0,0,9adcc99617b8264560a448864cfa925b25ac1a522a680cd7491d3775365a24
|
||||
CVE-2024-39610,0,0,5343055bcd0163768ab6327ea58c70d44bca3d34250efd82fb84b72dc771d3be,2024-11-20T15:02:14.297000
|
||||
CVE-2024-39612,0,0,33a99f9d5e7a84847570107d4ada7b5da5e937e8a3e280000a5cc5660179c96b,2024-09-04T16:38:56.383000
|
||||
CVE-2024-39613,0,0,7cafea60d2bb85cb27b66cde858f3744dc167d0cc43f0183fc2d18ab2b4fb18b,2024-09-20T13:59:01.117000
|
||||
CVE-2024-39614,0,1,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000
|
||||
CVE-2024-39614,0,0,75ff152b2e305b38e3e5a86e0a40ecb002a7a11b05ed580e4de49a4a662622af,2025-06-16T21:38:55.470000
|
||||
CVE-2024-39619,0,0,067410b7de6a8e32a69b3466976f3f37f3994accf19c4b46d2a649c1738d9ab4,2025-03-07T12:16:26.617000
|
||||
CVE-2024-3962,0,0,ac26c730ea7e98c5ae97bfda18ed5791ce686630787c902a3918c7f11fcc01ad,2025-02-07T02:07:02.537000
|
||||
CVE-2024-39620,0,0,3103eb99384deca53db687a27b3e5caaa6689cbe4eb572f735afe1f0771046b8,2024-08-30T16:30:39.210000
|
||||
@ -277806,7 +277806,7 @@ CVE-2024-57045,0,0,fb5ea4e4f7a4b9889a1febeaf0802625e04c77b289c8befbcdbc515a09b01
|
||||
CVE-2024-57046,0,0,fe99d44204f56661f0679c5d1ecb0fd6df526b6f6fc17cfa20ea09ee55d671c5,2025-02-19T22:15:23.207000
|
||||
CVE-2024-57049,0,0,2a0005173d8041814a4147620684c257c9ca3c68d2751da229477245e15e8a12,2025-06-06T17:59:07.280000
|
||||
CVE-2024-5705,0,0,f3b79a5d6cb194f0bd96745c53b497323f2e376cb2b6ea3a0bd2883a13683047,2025-02-19T23:15:10.823000
|
||||
CVE-2024-57050,0,0,a8a23107a1e42d1b6ac3205cc9b597da829b10740486a542824fbd3889bb45fd,2025-06-06T17:59:21.903000
|
||||
CVE-2024-57050,0,1,f6fe4502a7b18901ddf478890a963604732260de8ad7ae059ab03cc4eda5a419,2025-06-16T22:15:20.670000
|
||||
CVE-2024-57052,0,0,5683e7b641254ab70a5fb17d8461ee1673d426f59e2b3701e2e1d43626b51181,2025-01-28T20:15:54.727000
|
||||
CVE-2024-57055,0,0,10985f4d1644c583934097b7ec50c1a0dc3d6cc9f218e4bbfca50a2ea6ce6767,2025-02-19T21:15:15.227000
|
||||
CVE-2024-57056,0,0,5fa1c6daac1c565c60219576528f65f5f288f5ab9fda6e5efedccb351b0ddf0d,2025-02-18T22:15:14.653000
|
||||
@ -289630,6 +289630,7 @@ CVE-2025-27581,0,0,010725d7ecbfe0dd212b958a3a5bd2c7e9f3630c39f4e0964f9540d000321
|
||||
CVE-2025-27583,0,0,0323a5ab9427edc3fc5fcf52b07bbd68cd541b31029bf0b1077e85dabad17762,2025-03-05T17:15:16.693000
|
||||
CVE-2025-27584,0,0,f03e6726bedccad19322a88f13d717b29a57c1713f548b043d4f11c0c134f427,2025-03-04T17:15:20.527000
|
||||
CVE-2025-27585,0,0,720b68d2eda984711942f08d1f5d1c3e9ff08ec0907ec239e78ca92044ae9f6a,2025-03-04T17:15:20.690000
|
||||
CVE-2025-27587,1,1,737c929fdf729bd27a538e97494a0e65a31a264aa1fa51392616b0e648b80f2d,2025-06-16T22:15:44.093000
|
||||
CVE-2025-2759,0,0,6df40746bca0a076cfdd89fceb7edae074243de43f4b4548050e4f6a4f49b153,2025-05-23T15:55:02.040000
|
||||
CVE-2025-27590,0,0,967f795bd4c85a7326c3accbc97af4e437c14d446f9275cd756d84bf07c7deb5,2025-03-10T14:01:33.053000
|
||||
CVE-2025-27591,0,0,bde746d629d3275aa4bd9bd60b4521aac06adacde1e58fa17d924514d9ced6d1,2025-03-21T21:15:36.737000
|
||||
@ -290389,7 +290390,7 @@ CVE-2025-2956,0,0,12b742621d86c28d988776b85da597ef776ef6fe74e703c6823d14feeb258a
|
||||
CVE-2025-29568,0,0,3b23dcb888abcc37f1444d0fc863cef625a6ebdc671441b643f7de7ab4accc97,2025-05-14T13:09:12.467000
|
||||
CVE-2025-2957,0,0,d90251765154920d1060d5e6f1781980ec9f028972bb25184edb9ab3b3acf04f,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29570,0,0,ce09831559b48fe479ba4c5f9b34d0db4bbbbbf20068eb3ed4fe546923ebfe0f,2025-04-07T15:15:43.543000
|
||||
CVE-2025-29573,0,1,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000
|
||||
CVE-2025-29573,0,0,06884748a5fc29b781a49fdb90043d550ed36dfc5e15b1fbcf626b4039da325f,2025-06-16T20:19:43.233000
|
||||
CVE-2025-2958,0,0,9728ea5d0e1e0ffe03d484b47c7dc7d2f752fe0ff3a0cf460614ef3d0b6ffb41,2025-04-01T20:26:30.593000
|
||||
CVE-2025-2959,0,0,2e5fb15945faaa1aff3f84ae92ae41d627608b92925fe249b869a66c5d1ada9d,2025-04-15T18:17:30.903000
|
||||
CVE-2025-29594,0,0,2f622bba8fdc6dc52fbb1c6d9cffd703149b20ba0389fb0df41fe5a0ef1aba15,2025-04-08T18:13:53.347000
|
||||
@ -290406,13 +290407,13 @@ CVE-2025-2964,0,0,ec69ae3f38e343756ba814c2e5955dca4ab2cdb43321644a6a3ca4d2fda05b
|
||||
CVE-2025-29640,0,0,10d69d5153affdfdd1cfbbf32b1c82cf02889c3684c0ecfe28cc371bbe51cc15,2025-04-01T20:23:29.113000
|
||||
CVE-2025-29641,0,0,07728e025c7edec0a6c57cfca48077e7931db6a66e70d6357266b91cead71f8a,2025-04-01T20:23:16.657000
|
||||
CVE-2025-29647,0,0,b2c68859973ff17d99e38be6964fb50b00d742d76463efee1e3f756976e68d06,2025-04-08T20:15:30.700000
|
||||
CVE-2025-29648,0,0,a7eaa771354a705b285f1c3684a3f953432537672eb28b52e912d0d68517ff15,2025-04-24T12:52:00.727000
|
||||
CVE-2025-29649,0,0,d9f19c85152376fc41b6043f80b049c59ec4caf7c602a3488f5c6538fbc911b7,2025-04-24T12:51:37.493000
|
||||
CVE-2025-29648,0,1,84bec7b21f7c56a1385297c289052d8ecde84cec92268af480ddf8554a7270a0,2025-06-16T22:15:44.517000
|
||||
CVE-2025-29649,0,1,674d024497e2e807662619a838994b70647b9018a5b3a3e54a8fa02abea03a23,2025-06-16T22:15:55.553000
|
||||
CVE-2025-2965,0,0,b1d83303c83fa5c453f89d281c2631e556dad3281735af3c32f95354d255295b,2025-04-04T01:15:39.727000
|
||||
CVE-2025-29650,0,0,5f46dc6c7a387a28666637bcf7367f72ffe82767fe1270be661aad1f55cd5e69,2025-04-24T13:44:23.137000
|
||||
CVE-2025-29651,0,0,ee2e1abdc8add2e978c76a5d12cc323b8871d73c897faeaf0b2250b0a3c28292,2025-04-24T14:56:11.510000
|
||||
CVE-2025-29652,0,0,725117646d812bd9ba15bdbfca81a3949128b5f16ff0950b6d0bfd05d931b133,2025-04-24T13:56:26.960000
|
||||
CVE-2025-29653,0,0,56b2d2a07b99b4d66ca95d61135d9f92c834689e3e3ed529503dfff30cff5718,2025-04-24T13:54:34.550000
|
||||
CVE-2025-29650,0,1,cb690fb06c7e170a94213a0089eba59b88ea6951964a1db72e6fe406f0c5d8c0,2025-06-16T22:16:04.667000
|
||||
CVE-2025-29651,0,1,bffa517747fb1fd066ce6168347e27bf8df7ca0a832f9d9f64bf0567578be439,2025-06-16T22:16:13.750000
|
||||
CVE-2025-29652,0,1,8d5c668462d815386589b7176986a0f06753f6b9c9cb94261388491c1b545a66,2025-06-16T22:16:22.843000
|
||||
CVE-2025-29653,0,1,67a65ee0fcb50c85eef841f0e84da2c245401851e7c01a4f02b2fa6f7a74fb5e,2025-06-16T22:16:31.940000
|
||||
CVE-2025-29659,0,0,f9e8d6621163c83dcf8fec3e0aa9d79236f03dcdde01fbd274cbdbc678026bf1,2025-04-23T14:08:13.383000
|
||||
CVE-2025-2966,0,0,4b9026ccd40e00fcfd51a7652f6490239e965ca285425fe097bdd2da5faa6bb0,2025-04-04T01:15:39.793000
|
||||
CVE-2025-29660,0,0,7872b4589e7a281e05a7df2d5b23f35c28a06e32d443bbdd2d26b4ef96f8e1b9,2025-04-23T14:08:13.383000
|
||||
@ -290820,12 +290821,12 @@ CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2
|
||||
CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000
|
||||
CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000
|
||||
CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000
|
||||
CVE-2025-30317,0,1,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000
|
||||
CVE-2025-30317,0,0,eaecc747d49a568cc39fe4d6912494690707dd4e5866f61992f41e27efc909e0,2025-06-16T21:27:49.447000
|
||||
CVE-2025-30318,0,0,e9585c50b60ffa8b64da830b96992e12585dd9971124ba2c8ec2d12aa9784ca0,2025-05-14T14:28:36.363000
|
||||
CVE-2025-30319,0,0,eb12dac8472fdfe9992ec3368e7c4232ecf79a9fba5a19c43d0577fbd40d843d,2025-05-14T14:28:51.907000
|
||||
CVE-2025-3032,0,0,f8b4ab2f73ff457fe82cca4d434a54ce5e1088aad2e6e70e30f2847b41780fdf,2025-04-07T13:31:04.710000
|
||||
CVE-2025-30320,0,0,5faa500599293b831a4781f7de4dfeab3c23d52e0e4bd715e06e02481844c75b,2025-05-14T14:28:59.920000
|
||||
CVE-2025-30321,0,1,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000
|
||||
CVE-2025-30321,0,0,0afe8e51fb4e51970859c3c43c333dc7d8aaebb8afcd87e0a791097204ca8c33,2025-06-16T21:32:02.783000
|
||||
CVE-2025-30322,0,0,fffb143d86fda45cfaab46b7f00cb9ce6863b83ec5cc74e528f6ecd921540634,2025-05-19T17:10:08.910000
|
||||
CVE-2025-30324,0,0,cc814187ea587e10cc609b1aa2e1d499f6d169893aea075eef7cd426f0fb5529,2025-05-22T18:34:10.280000
|
||||
CVE-2025-30325,0,0,28ff58c7866f3c5b8b7c6c71294d9237d94bc56e945e412c9e15b3bb0632bfd8,2025-05-22T18:33:36.103000
|
||||
@ -292946,10 +292947,10 @@ CVE-2025-32794,0,0,e5c75374c7acd23f4b7bf6398c0b16e7126deed02aabe7e5caf26f8df1848
|
||||
CVE-2025-32795,0,0,9b91f12206c53caef7f7087deba98182feb5bc18c57224b5893c030b3a403c24,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32796,0,0,20ed07849a09b1f538632557f0ede2b9976cfa2cb03f0965ae7b2114a9dbac36,2025-04-30T16:12:32.757000
|
||||
CVE-2025-32797,0,0,28082659442d2f9caf3b20b177923fc2a5249fb7d4c413f133fbad3ac6617b7c,2025-06-16T19:15:33.510000
|
||||
CVE-2025-32798,1,1,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000
|
||||
CVE-2025-32799,1,1,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000
|
||||
CVE-2025-32798,0,0,3b2f20fc76c1f3f807497fc4a8441c72fa470411c933d21c3bd116a9d628d28b,2025-06-16T20:15:27.200000
|
||||
CVE-2025-32799,0,0,adc17354685be5a1d664ce4fc8da817a7780171d02371029a6753caa0c1bcfc6,2025-06-16T21:15:23.683000
|
||||
CVE-2025-3280,0,0,bbfa48dab65dd8e30d4af992e1eee1a23f41dd90ea1a7ea7a1775416dce3500e,2025-04-29T13:52:47.470000
|
||||
CVE-2025-32800,1,1,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000
|
||||
CVE-2025-32800,0,0,a3b485e8169439c61e9425a2d77a02aafbf1d0102042f325b3a29373b1d216cb,2025-06-16T21:15:23.847000
|
||||
CVE-2025-32801,0,0,6146013012d0cc266cf2a68a1cfcd1c7bf0ca9e930c722235f6d34464ee53a2b,2025-05-29T14:29:50.247000
|
||||
CVE-2025-32802,0,0,f6e78eb116b2cd56d8ef0898bf440fc0936b1baf62e5eadf8e89c04d3f335f9e,2025-05-29T14:29:50.247000
|
||||
CVE-2025-32803,0,0,f6920fa88ece4e7143788cee904b73826ee8e5e4a2ab79ec11586c6e694e4f40,2025-05-29T14:29:50.247000
|
||||
@ -293475,7 +293476,7 @@ CVE-2025-3634,0,0,f1df1ce281d4f05da7d71805ec7234d4d7b9375eb0df11046db6b194005749
|
||||
CVE-2025-3635,0,0,d0b560b1de78f379fe7f701ac4faf0bc2dd5f1916438a1bf60f9e86147301708,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3636,0,0,ceaad85bcd46f58415162f18dbf8cfc38d5ab635c16737d3ade9ca6e7b13c8d6,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3637,0,0,c87041797c311e81a89dfd1fc18de62f159879af670bfc90cb09b45a20c270e1,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3638,0,1,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000
|
||||
CVE-2025-3638,0,0,0b36fddd5515287a1a712f272220188fa7e5b84f4e00c89fe48c91044f4ac294,2025-06-16T21:03:13.033000
|
||||
CVE-2025-3640,0,0,6bdde0071981ec66085b65d919467b17b738e8eae4a4b1251a80c28ae8725e70,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3641,0,0,dbfd44d03760d8b3be148abd0efc0467b1e063b595f60cf58929e9634a8e273d,2025-04-29T13:52:28.490000
|
||||
CVE-2025-3642,0,0,ca4fa0ca9109366f127ceafe021e351913f33001fd19e6b1dd6b95dc80ada57f,2025-04-29T13:52:28.490000
|
||||
@ -294792,6 +294793,7 @@ CVE-2025-4315,0,0,321394bc3849af4ab9b6cd61bfefb289f1f6cc25ce89390fc43856f0333190
|
||||
CVE-2025-4316,0,0,a850e49ba627f858db58117c4cb778bc199e996d4e90b919c7290f94c5d139b8,2025-05-14T13:15:48.907000
|
||||
CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000
|
||||
CVE-2025-4318,0,0,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000
|
||||
CVE-2025-43200,1,1,91f3d0c6a5bc8d72322fe26af614b864d8e65f6dd74cd9172b8234b9066c7270,2025-06-16T22:16:41.120000
|
||||
CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4323,0,0,c1269792d01afee15d189426619dce99f2b7fd20ca7e7484441a414f66a84606,2025-05-07T14:13:35.980000
|
||||
CVE-2025-4324,0,0,322bfee86bcfcb6ca23d23a1743d3ee5a6951408d15d6bec55f13d4d4fd25fa3,2025-05-07T14:13:35.980000
|
||||
@ -294836,7 +294838,7 @@ CVE-2025-43554,0,0,72f8a55aa3016b7b98602aea28c96ba8387be55ce503a81731ea16020f85c
|
||||
CVE-2025-43555,0,0,19d4da2bfc545b26b865091f8de87f344da2925ac800cb983df6cbdd3dd38236,2025-05-15T18:39:08.297000
|
||||
CVE-2025-43556,0,0,eca516d80145b82d74e737be6b84aa271756b3ab57b5bfd3b44c5b6cb06029d1,2025-05-15T18:39:00.157000
|
||||
CVE-2025-43557,0,0,46ce49a54afa407d288372144d1569006db3ee5a386d9b87264495da2521727d,2025-05-15T18:38:50.533000
|
||||
CVE-2025-43558,0,1,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000
|
||||
CVE-2025-43558,0,0,c114eb89f9c94a14205e0cf12555f005ae5fff71f5c84fdbe3bd23161b529676,2025-06-16T21:31:49.540000
|
||||
CVE-2025-43559,0,0,5ba3945b07996edeb9a056650b7e4cc9fac22eca84981fc7a2c7dcc1b7da159c,2025-05-19T20:31:34.550000
|
||||
CVE-2025-4356,0,0,1808eaf22cb046635d44f9db8c325a9360bb6eb68204b8a94aa8ea43d160384c,2025-05-13T20:24:15.620000
|
||||
CVE-2025-43560,0,0,f024c3768806730423456b31d211372c754d424eed90de6b61cf7127fc2f200a,2025-05-19T20:35:23.227000
|
||||
@ -294865,10 +294867,10 @@ CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc1
|
||||
CVE-2025-43585,0,0,0ee58ab063c833215b13953595c7415a2875f7dfd620cd1a98fc39dd0300acdd,2025-06-12T16:06:39.330000
|
||||
CVE-2025-43586,0,0,84d6946d4240412f9ea7e35b1116044dd84f632670958760f891cc307e06b113,2025-06-12T16:06:39.330000
|
||||
CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6deb5,2025-06-12T16:06:29.520000
|
||||
CVE-2025-43589,0,1,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
|
||||
CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
|
||||
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
|
||||
CVE-2025-43590,0,1,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
|
||||
CVE-2025-43593,0,1,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
|
||||
CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
|
||||
CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
|
||||
CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000
|
||||
CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000
|
||||
CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000
|
||||
@ -295185,8 +295187,8 @@ CVE-2025-4515,0,0,15842f64bc5158ee594ebc8bcc08fddcbccd67b13581d77b6c2aa4b49c2d35
|
||||
CVE-2025-4516,0,0,796b8f07feac2cf0afff20513d00fadb85e8da28c0408ddb3453089e5fc0ed01,2025-06-03T14:15:49.697000
|
||||
CVE-2025-4517,0,0,8f51c46af888510dd73bb462bbca2c104af9d3c9f1d6809b8679167122b8adcb,2025-06-05T14:15:33.050000
|
||||
CVE-2025-4520,0,0,2649cd1b163a0622d5bf29e4b3dee5950ca643285f952a7b68fc954427092ffd,2025-05-16T14:43:56.797000
|
||||
CVE-2025-45236,0,1,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000
|
||||
CVE-2025-45237,0,1,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000
|
||||
CVE-2025-45236,0,0,9830570b306de4a57c004cb48836797797fb1d76b38f8162fa9abe4600c7152d,2025-06-16T20:36:27.817000
|
||||
CVE-2025-45237,0,0,5f8d1ec8e1b1339bb5462775e85ab06ba1121e2fb8ab2bc11bb23bc8829151ce,2025-06-16T20:35:29.437000
|
||||
CVE-2025-45238,0,0,b39549f1b61e24807431d3a951f2254a17eb0dbb519151422154254ab9990a40,2025-06-12T17:39:05.167000
|
||||
CVE-2025-45239,0,0,991350366fb0c83185e15ef1dc4c822dd146409f9225ec787d11246fc95065fc,2025-06-12T17:34:08.947000
|
||||
CVE-2025-4524,0,0,9f2ebfa9f8ca01d98c78b645fd8edee7f81ea49ceedcaa7d6aa7658167675b4b,2025-05-21T20:24:58.133000
|
||||
@ -295253,13 +295255,13 @@ CVE-2025-4557,0,0,923891368ba582855d183f0d5ed088d1956f49e0c8ca1b57be2ee3de815507
|
||||
CVE-2025-4558,0,0,c51dcc9b20597a586f895771ce09346fff8c096f4a984512090059be827823b1,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4559,0,0,501974ee65c3407829c4ff0fc2a00de3038d9f8b3a2c9015f4408c8d496962ee,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4560,0,0,823d3f1a0cdcb165bbc1b67941faa6edd3e4515651bcf7fd119ca884109cd9b0,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45607,0,1,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000
|
||||
CVE-2025-45607,0,0,fffa21d5b90a35012c61783fd1f71093104910573d69364d365590853d097560,2025-06-16T20:17:27.537000
|
||||
CVE-2025-45608,0,0,7e3c4c58c1ade44391ab70b89a990f1ca9ac0effbe72f1f748d083655476c797,2025-05-06T14:15:37.827000
|
||||
CVE-2025-45609,0,0,06affab3802b43ae1968573a7a3af6dd916eb663f70dda2f2ad7c25bb77cc10d,2025-05-06T14:15:37.983000
|
||||
CVE-2025-4561,0,0,e4177b88ab0583a3c8a6f6e3d419ecb83b860ceaf129cd282a7808dbb5d294e0,2025-05-12T17:32:32.760000
|
||||
CVE-2025-45610,0,0,36fda72579ee19bcdaf663e853af79b2168dd075bca3c6cbdaf261b30ad1f0e0,2025-05-06T14:15:38.153000
|
||||
CVE-2025-45611,0,0,e0ef9e668b81f5bbbbc066e7d93540ec7cf50f0cdb3ee5117e568efa0fa1f968,2025-05-06T14:15:38.317000
|
||||
CVE-2025-45612,0,1,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000
|
||||
CVE-2025-45612,0,0,aa12a5613c6acbac0c0a52bbedf8110e15d8007b501022b489be1408a2902c1f,2025-06-16T20:00:50.837000
|
||||
CVE-2025-45613,0,0,576651e2464558fbb6a2d5fd1d1a5eaec94a8b79e83eb09711f47a8a962694b8,2025-05-06T14:15:38.630000
|
||||
CVE-2025-45614,0,0,11010ca358744e76d6a8d87844f129a25b0b063b116429fdbd92c04c1d120279,2025-05-06T04:16:14.580000
|
||||
CVE-2025-45615,0,0,cd4b38212bfe3b58d8a8954f5868c330ece936029e48916fc212bace97574bc7,2025-05-06T04:16:16.153000
|
||||
@ -295664,7 +295666,7 @@ CVE-2025-4664,0,0,d4044bce681082456ae2ed2a3baaa6f65e61937d9e24855cf4b96203efa269
|
||||
CVE-2025-46646,0,0,9a8a54d0124778094859178ae2a1be4b3ab7d35f7adc764a918d49bfc846da89,2025-04-29T13:52:10.697000
|
||||
CVE-2025-46652,0,0,9d812ecaad689bd29eeb08cd6e51fc2313308ed71660c22dce020d578677f79a,2025-04-29T13:52:10.697000
|
||||
CVE-2025-46653,0,0,3b6009fc3a51ec55453aaec5d1f7a19d2114d1ff8e2f811535a6f418b5dab168,2025-04-29T16:15:37.150000
|
||||
CVE-2025-46654,0,1,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
|
||||
CVE-2025-46654,0,0,0aa14c4ea6fe1b19c5c6aa8b1b364a4f4f00114d15c5d807117da3c6c36c9dc8,2025-06-16T21:00:11.573000
|
||||
CVE-2025-46655,0,0,34630625faf28d1a43b5cdb5fca99ebd8a91139b3a9b9f2e1d3fba1d80e58054,2025-04-29T16:15:37.440000
|
||||
CVE-2025-46656,0,0,88d2e959cac4cda5103c704a18b5a278dfdfbb63d41e023dbd311e14a8416d7e,2025-04-29T16:15:37.573000
|
||||
CVE-2025-46657,0,0,4b6d658b20503b01465fb89f1f4e404ee10732b42838e3f3a51606289348610b,2025-05-12T19:07:34.390000
|
||||
@ -296012,9 +296014,9 @@ CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673
|
||||
CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000
|
||||
CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000
|
||||
CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000
|
||||
CVE-2025-47104,0,1,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
|
||||
CVE-2025-47105,0,1,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
|
||||
CVE-2025-47106,0,1,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
|
||||
CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
|
||||
CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
|
||||
CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
|
||||
CVE-2025-47107,0,0,fdd924643f30ad0038e7fd95dd810702588a19273ddc406fc67f30e962777fd0,2025-06-12T16:06:29.520000
|
||||
CVE-2025-47108,0,0,357230c30613137af807a607a4225bc350d8e27b93f9449fb985d3fecb4482a6,2025-06-12T16:06:39.330000
|
||||
CVE-2025-4711,0,0,21c8c473cfd0b8fb70049ba4f98b86bc8037c0e94662198ff53f909236b4a0c5,2025-05-27T14:10:06.050000
|
||||
@ -296170,7 +296172,7 @@ CVE-2025-47475,0,0,419116b80f7fe9386a9aac3c0836858ef647ac252eac4b1ff08d67e0a3375
|
||||
CVE-2025-47476,0,0,f06946c9db65910277eefdd02a4e277fdae7c5884111c0fe22a4a0e5abb63365,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47477,0,0,77da2db11e5826e5ac8b7646c2ab3c2664e4f15f6b958d535ab609737d59cbfd,2025-06-12T16:06:47.857000
|
||||
CVE-2025-47478,0,0,e6d6adb3b1616923ef0638df6a5bba4a6a66b2f12e5e8ad860cddbc43d60dfda,2025-05-23T15:54:42.643000
|
||||
CVE-2025-4748,0,1,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000
|
||||
CVE-2025-4748,0,0,ca31697b4209a75e135d47e1ec1233b9df790bf7840bea1b03bd9ce709b6dbca,2025-06-16T20:15:27.750000
|
||||
CVE-2025-47480,0,0,ef5cc5737d0e088e76573f050c6e079a8e6e4769a34e7600bd175867d6608ec8,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47481,0,0,9dd0d7411f22176e27723210f288403628c90f1234e60ae0d0856344023dd406,2025-05-08T14:39:18.800000
|
||||
CVE-2025-47482,0,0,961d8ef4753c50b36e4d7feaf8debc74b4e022889d69dcdb4a7b418fc8bebc1e,2025-05-08T14:39:18.800000
|
||||
@ -296525,7 +296527,7 @@ CVE-2025-47948,0,0,ba2e8c1cb0258308d0310ef150246d3504511a8f7fe9ed640ab9013bfefad
|
||||
CVE-2025-47949,0,0,dc86078901df64be63bcaee4a73ca319eec3de89fa5549a71818463921d49b3a,2025-05-21T20:25:16.407000
|
||||
CVE-2025-4795,0,0,3fd0e28eaafb548c1d9f9e6a41da631ae960e10221f6f4901b1a5e253e1ad775,2025-05-19T13:35:20.460000
|
||||
CVE-2025-47950,0,0,4b0b13462648502a1d9e9c65a1a516635c319d24d84102d181b2a27357de0e4c,2025-06-09T12:15:47.880000
|
||||
CVE-2025-47951,1,1,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000
|
||||
CVE-2025-47951,0,0,86333cf5e9e8a5a2394e7c92f3ecefb7d8ebdf720749508a166bd575cd813c09,2025-06-16T21:15:24.010000
|
||||
CVE-2025-47952,0,0,98063020cb9f5c2b480f0cb92a50eeedaf8c49e542ef7ba3da076028de108162,2025-05-30T16:31:03.107000
|
||||
CVE-2025-47953,0,0,4efadcb8de5ee103c4397343fd477ac2f1cc76312f377843529dc0565acd9d4e,2025-06-12T16:06:29.520000
|
||||
CVE-2025-47955,0,0,eb2ec88dd5cc932731cf640b586ede1e8a1ad4d65d53649a0708f1fa7a7dcbc2,2025-06-12T16:06:29.520000
|
||||
@ -296963,11 +296965,12 @@ CVE-2025-48960,0,0,6388a249faff67cc5a4d2fa4bca8d3989a10ec11030dddacff72a168ec292
|
||||
CVE-2025-48961,0,0,44e1cee69124b46bd6b795101bc0b7c9c4699ce00a138653c66e2e8aeff53be4,2025-06-04T14:54:33.783000
|
||||
CVE-2025-48962,0,0,4b2d64282106eed58f9e4647aa4bdcfb03945a2468e53d084f7081033bf14af0,2025-06-04T14:54:33.783000
|
||||
CVE-2025-4897,0,0,104730cc5ad0680860a774881c7ad06896ad7afe2bb00c017480a43cf79011cd,2025-05-27T16:30:05.410000
|
||||
CVE-2025-48976,0,1,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000
|
||||
CVE-2025-48976,0,0,ab1bc5562757eff2a298b7ce1b2f60f8d15bbc3717ff9ce51046390347fc9b0e,2025-06-16T20:15:27.350000
|
||||
CVE-2025-4898,0,0,088de021e18707e0dc4ec8499500601b39900fc456f0a7d4c0f7a0b50fbac254,2025-05-21T19:37:41.533000
|
||||
CVE-2025-48988,0,1,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000
|
||||
CVE-2025-48988,0,0,af79b0d56ade70d464da7381544626bd5b7c0be41380335aba730b61b05234c6,2025-06-16T20:15:27.447000
|
||||
CVE-2025-4899,0,0,384aad67823f1c19c564c5975182391c80467536acba8235a635dfd93a5393e3,2025-05-21T19:37:31.280000
|
||||
CVE-2025-48990,0,0,35250e6aeab8f33cddd6a2463ca29c89c0b5491c46e9371235f8d9552555aa3b,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48992,1,1,020a35cfe3046cb69fffeb0fe8d92462d7fc52c795b4589f9a69904b72342f16,2025-06-16T23:15:21.827000
|
||||
CVE-2025-48994,0,0,2347eea9d248ee0ef643957a0a53d1ea86b7f69fd6aea9013390675ac9969f47,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48995,0,0,13be942b01243f59599a7f021ac94d7f691b51f24284ec645c1ab118368b0b77,2025-06-02T17:32:17.397000
|
||||
CVE-2025-48996,0,0,a5bc0462fba0b0454b69362838585b85b6432cd607f3470780f5a230a04991c5,2025-06-04T14:54:33.783000
|
||||
@ -297012,15 +297015,15 @@ CVE-2025-4911,0,0,8165f0d1dc1e78afded21e50626575112805e2ff63d8f266295fb56c02f369
|
||||
CVE-2025-49112,0,0,53acc03eb5f34e287cf80e6f2606bfb4760fb16ea2fe509fc70b20f7de56218f,2025-06-02T17:32:17.397000
|
||||
CVE-2025-49113,0,0,56a8fd04a9ef82f1d5c677d3aef05bbaae629657949015a38e21cc671f31eeb2,2025-06-12T17:15:29.310000
|
||||
CVE-2025-4912,0,0,952cc1697455c59886c397e61a80308747f6eedd0f377c0531d621b366fc5d7d,2025-05-21T17:41:21.063000
|
||||
CVE-2025-49124,0,1,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000
|
||||
CVE-2025-49125,0,1,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000
|
||||
CVE-2025-49124,0,0,3c217f37578e1849840faa6b85bf65635ac11a99332db91c6d0115ed08f141be,2025-06-16T20:15:27.557000
|
||||
CVE-2025-49125,0,0,5e8874247a201cb56394c3b5234a03113a560a96bb6f82b09d2c3dfa5cdcf8fd,2025-06-16T20:15:27.650000
|
||||
CVE-2025-49127,0,0,3f4889eef877e3cbd48aa702e8cb35c833e3234501017b5b4ce4fc613f23b00a,2025-06-09T16:15:44.833000
|
||||
CVE-2025-49128,0,0,be74e1e3636b4e3c68c2e5f707126adefa5b42c030884a0a961eb0fa96655c19,2025-06-09T16:15:44.947000
|
||||
CVE-2025-4913,0,0,53b3af32223266d4fefa6288fa7668d3e6278e5d2f6f83bce997bdbd90d149c2,2025-05-19T17:37:22.390000
|
||||
CVE-2025-49130,0,0,c7a7f43db7ab1736ae0ac701a4154668121fb632c9f0116d3af26488234c6f03,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49131,0,0,8a44c490c7fa295d5533f610dd64963399edc71879b888527baab1ab4d531129,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49133,0,0,8088c6aaceb03a008d386616b846a037fdecedf4d2cd5516fa2cf3ebcd733d0a,2025-06-12T16:06:29.520000
|
||||
CVE-2025-49134,1,1,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000
|
||||
CVE-2025-49134,0,0,792f49c3c5d75906c9f62279f0a3a64786a4e379b66ebafc30f77504393dabbf,2025-06-16T21:15:24.167000
|
||||
CVE-2025-49136,0,0,c1d869d890c14268fd4f2fb480144530c7eab04eea9b543be4e0614ad0048264,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49137,0,0,a477190bb63ed4681206816d4240428efe69c92093321f84a64a5bd0869453f3,2025-06-12T16:06:47.857000
|
||||
CVE-2025-49138,0,0,8c9222e6db28a0722fcd86b0c6153a24f83a1107e7a502e6df61b7751665bb28,2025-06-12T16:06:47.857000
|
||||
@ -298044,10 +298047,16 @@ CVE-2025-6132,0,0,94b02d7f3985b6649b8d5c4432445df1fe94d7793a3e8e46bb2916e7f8ee69
|
||||
CVE-2025-6133,0,0,27d52f36b7e8d5b05576aa449ff5731fc04b86760269fdcdf2273be8ac827c92,2025-06-16T18:15:22.033000
|
||||
CVE-2025-6134,0,0,4257b9cd77f1960d6cdf4eeb3bffc7ec6ddfc5aca9d6259ece844471c8473564,2025-06-16T19:15:34.633000
|
||||
CVE-2025-6135,0,0,29e788198e5272e3b58eef7a2549776ef0373c688e618eda330248e6560eaf81,2025-06-16T19:15:34.850000
|
||||
CVE-2025-6136,1,1,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000
|
||||
CVE-2025-6137,1,1,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000
|
||||
CVE-2025-6138,1,1,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000
|
||||
CVE-2025-6139,1,1,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000
|
||||
CVE-2025-6136,0,0,176abadfc1b38f1e5124fa45bec2d5dc2bb5b6074a30c85c28372387f0dffabe,2025-06-16T20:15:27.863000
|
||||
CVE-2025-6137,0,0,5c8c7b975ca226277ed0790ed01c97657492009374dc6bc55c1a30f767d80158,2025-06-16T20:15:28.040000
|
||||
CVE-2025-6138,0,0,d30c5c35a881c39e3c70e5b99787cc0589a79d3349beca7d24e7e674be6859cc,2025-06-16T21:15:24.323000
|
||||
CVE-2025-6139,0,0,7cba670209d8308093d2e5607a543575d2624cdbba77aade528775737b26a49d,2025-06-16T21:15:24.513000
|
||||
CVE-2025-6140,1,1,b4769e2ad859cd6aad24ff664586d54d514a3baa4745610fe22c97c6833e6a97,2025-06-16T22:16:41.250000
|
||||
CVE-2025-6141,1,1,2541dd4213d822272a8ed07f6043934e922cfdefe6ec3d88a669822ded83f053,2025-06-16T22:16:41.527000
|
||||
CVE-2025-6142,1,1,db688935d8075655dfd000e77c5911a0d1cb69d0bfe761db1b8980de9960e1d7,2025-06-16T22:16:41.710000
|
||||
CVE-2025-6143,1,1,5a45a270d06f2e4e533159e0a51094901e0eeea9008d15cc57f14739c54b844a,2025-06-16T23:15:22.500000
|
||||
CVE-2025-6144,1,1,99e48eaa193e4b62e7191e8d52c6345135d324216f04cbbdba8519edb362ce54,2025-06-16T23:15:22.683000
|
||||
CVE-2025-6145,1,1,2e898950b03f74de6d569cac07508094946b059ab1dfd4f6ec1f379f9376a406,2025-06-16T23:15:22.863000
|
||||
CVE-2025-6169,0,0,24b56c63dd5c2b9799043dae6dc3b75a3e06e9ee630be707f681a9bb09cd5b58,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6170,0,0,b6c9e594edbf46197f9f9a30d565b603f055d40c252eab039c7ec60bb43a9554,2025-06-16T16:15:20.430000
|
||||
CVE-2025-6172,0,0,df5b11377ae2bcb860baea092fdadde3351cf8aeca30edf92e0d7977024948be,2025-06-16T17:15:31.503000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user