Auto-Update: 2025-06-13T10:00:20.209956+00:00

This commit is contained in:
cad-safe-bot 2025-06-13 10:03:56 +00:00
parent 604a22b40b
commit 3027b5029e
11 changed files with 510 additions and 41 deletions

View File

@ -0,0 +1,48 @@
{
"id": "CVE-2024-38824",
"sourceIdentifier": "security@vmware.com",
"published": "2025-06-13T08:15:18.800",
"lastModified": "2025-06-13T08:15:18.800",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Directory traversal vulnerability in recv_file method allows arbitrary files to be written to the master cache directory."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@vmware.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"references": [
{
"url": "https://docs.saltproject.io/en/3006/topics/releases/3006.12.html",
"source": "security@vmware.com"
},
{
"url": "https://docs.saltproject.io/en/3007/topics/releases/3007.4.html",
"source": "security@vmware.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-55585",
"sourceIdentifier": "cve@mitre.org",
"published": "2025-06-07T19:15:22.333",
"lastModified": "2025-06-09T12:15:47.880",
"lastModified": "2025-06-13T08:15:19.127",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -85,6 +85,10 @@
{
"url": "https://mops.eu",
"source": "cve@mitre.org"
},
{
"url": "https://www.mops.eu",
"source": "cve@mitre.org"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-36506",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-06-13T09:15:19.223",
"lastModified": "2025-06-13T09:15:19.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "External control of file name or path issue exists in RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.242.0. If an attacker sends a specially crafted request, arbitrary files in the file system can be overwritten with log data."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-73"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN27937557/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000004",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,44 @@
{
"id": "CVE-2025-39240",
"sourceIdentifier": "hsrc@hikvision.com",
"published": "2025-06-13T08:15:19.377",
"lastModified": "2025-06-13T08:15:19.377",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Some Hikvision Wireless Access Point are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "hsrc@hikvision.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.2,
"impactScore": 5.9
}
]
},
"references": [
{
"url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/remote-command-execution-vulnerability-in-some-hikvision-wireless-access-point/",
"source": "hsrc@hikvision.com"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-46783",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-06-13T09:15:19.620",
"lastModified": "2025-06-13T09:15:19.620",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Path traversal vulnerability exists in RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.242.0. If this vulnerability is exploited, arbitrary code may be executed on the PC where the product is running by tampering with specific files used on the product."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.3,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN27937557/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000005",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -0,0 +1,104 @@
{
"id": "CVE-2025-48825",
"sourceIdentifier": "vultures@jpcert.or.jp",
"published": "2025-06-13T09:15:19.937",
"lastModified": "2025-06-13T09:15:19.937",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RICOH Streamline NX V3 PC Client versions 3.5.0 to 3.7.0 contains an issue with use of less trusted source, which may allow an attacker who can conduct a man-in-the-middle attack to eavesdrop upgrade requests and execute a malicious DLL with custom code."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 2.0,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV30": [
{
"source": "vultures@jpcert.or.jp",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 2.5,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.0,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "vultures@jpcert.or.jp",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-348"
}
]
}
],
"references": [
{
"url": "https://jvn.jp/en/jp/JVN27937557/",
"source": "vultures@jpcert.or.jp"
},
{
"url": "https://www.ricoh.com/products/security/vulnerabilities/vul?id=ricoh-2025-000006",
"source": "vultures@jpcert.or.jp"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49182",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-06-12T14:15:30.437",
"lastModified": "2025-06-12T16:06:20.180",
"lastModified": "2025-06-13T09:15:20.130",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"description": [
{
"lang": "en",
"value": "CWE-862"
"value": "CWE-540"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-49186",
"sourceIdentifier": "psirt@sick.de",
"published": "2025-06-12T14:15:31.013",
"lastModified": "2025-06-12T16:06:20.180",
"lastModified": "2025-06-13T09:15:20.383",
"vulnStatus": "Awaiting Analysis",
"cveTags": [],
"descriptions": [
@ -42,7 +42,7 @@
"description": [
{
"lang": "en",
"value": "CWE-79"
"value": "CWE-307"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6012",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-13T08:15:19.507",
"lastModified": "2025-06-13T08:15:19.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Auto Attachments plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 1.8.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security@wordfence.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:L",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.3,
"impactScore": 3.7
}
]
},
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://plugins.svn.wordpress.org/auto-attachments/trunk/auto-attachments.php",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/978c13e5-d30c-4caa-ab6d-256f2517fd79?source=cve",
"source": "security@wordfence.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-13T08:00:19.160782+00:00
2025-06-13T10:00:20.209956+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-13T07:15:22.663000+00:00
2025-06-13T09:15:20.383000+00:00
```
### Last Data Feed Release
@ -33,33 +33,28 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
297872
297878
```
### CVEs added in the last Commit
Recently added CVEs: `13`
Recently added CVEs: `6`
- [CVE-2024-38822](CVE-2024/CVE-2024-388xx/CVE-2024-38822.json) (`2025-06-13T07:15:19.300`)
- [CVE-2024-38823](CVE-2024/CVE-2024-388xx/CVE-2024-38823.json) (`2025-06-13T07:15:20.580`)
- [CVE-2024-38825](CVE-2024/CVE-2024-388xx/CVE-2024-38825.json) (`2025-06-13T07:15:20.717`)
- [CVE-2025-22236](CVE-2025/CVE-2025-222xx/CVE-2025-22236.json) (`2025-06-13T07:15:20.863`)
- [CVE-2025-22237](CVE-2025/CVE-2025-222xx/CVE-2025-22237.json) (`2025-06-13T07:15:21.010`)
- [CVE-2025-22238](CVE-2025/CVE-2025-222xx/CVE-2025-22238.json) (`2025-06-13T07:15:21.150`)
- [CVE-2025-22239](CVE-2025/CVE-2025-222xx/CVE-2025-22239.json) (`2025-06-13T07:15:21.290`)
- [CVE-2025-22240](CVE-2025/CVE-2025-222xx/CVE-2025-22240.json) (`2025-06-13T07:15:21.430`)
- [CVE-2025-22241](CVE-2025/CVE-2025-222xx/CVE-2025-22241.json) (`2025-06-13T07:15:21.567`)
- [CVE-2025-22242](CVE-2025/CVE-2025-222xx/CVE-2025-22242.json) (`2025-06-13T07:15:21.710`)
- [CVE-2025-4227](CVE-2025/CVE-2025-42xx/CVE-2025-4227.json) (`2025-06-13T06:15:22.253`)
- [CVE-2025-4229](CVE-2025/CVE-2025-42xx/CVE-2025-4229.json) (`2025-06-13T06:15:22.490`)
- [CVE-2025-5923](CVE-2025/CVE-2025-59xx/CVE-2025-5923.json) (`2025-06-13T07:15:22.663`)
- [CVE-2024-38824](CVE-2024/CVE-2024-388xx/CVE-2024-38824.json) (`2025-06-13T08:15:18.800`)
- [CVE-2025-36506](CVE-2025/CVE-2025-365xx/CVE-2025-36506.json) (`2025-06-13T09:15:19.223`)
- [CVE-2025-39240](CVE-2025/CVE-2025-392xx/CVE-2025-39240.json) (`2025-06-13T08:15:19.377`)
- [CVE-2025-46783](CVE-2025/CVE-2025-467xx/CVE-2025-46783.json) (`2025-06-13T09:15:19.620`)
- [CVE-2025-48825](CVE-2025/CVE-2025-488xx/CVE-2025-48825.json) (`2025-06-13T09:15:19.937`)
- [CVE-2025-6012](CVE-2025/CVE-2025-60xx/CVE-2025-6012.json) (`2025-06-13T08:15:19.507`)
### CVEs modified in the last Commit
Recently modified CVEs: `1`
Recently modified CVEs: `3`
- [CVE-2024-6538](CVE-2024/CVE-2024-65xx/CVE-2024-6538.json) (`2025-06-13T06:15:21.310`)
- [CVE-2024-55585](CVE-2024/CVE-2024-555xx/CVE-2024-55585.json) (`2025-06-13T08:15:19.127`)
- [CVE-2025-49182](CVE-2025/CVE-2025-491xx/CVE-2025-49182.json) (`2025-06-13T09:15:20.130`)
- [CVE-2025-49186](CVE-2025/CVE-2025-491xx/CVE-2025-49186.json) (`2025-06-13T09:15:20.383`)
## Download and Usage

View File

@ -264631,9 +264631,10 @@ CVE-2024-38819,0,0,c298508c17117e1259d3bfe55735b04be8f822cea51854f73ce47b1bd6cf0
CVE-2024-3882,0,0,ff357033633ea83089941ee72ffb1ed520c8dd6a221dd7e52cb47b408a9921af,2025-01-27T16:24:52.420000
CVE-2024-38820,0,0,517fdb1091af57612900b39a11b0b83e3890144a7a4d4cb71cfb71c69b405fa9,2024-11-29T12:15:07.007000
CVE-2024-38821,0,0,74b8175803172fc63d22dc332a41fdd98b88e2c1ead7e686074b3e1c775d2446,2025-01-24T20:15:32.427000
CVE-2024-38822,1,1,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000
CVE-2024-38823,1,1,b63f600119babfcd1b88d3b66789bd9b95c29f7b7675d097c00a7d24aff9b414,2025-06-13T07:15:20.580000
CVE-2024-38825,1,1,203649d9550a3a16e86d52bd19d99320fe94919f9798485742bccd2920441720,2025-06-13T07:15:20.717000
CVE-2024-38822,0,0,1de129502c834593a380596e49c11c4c982d91761db595315325ff60e1f44ece,2025-06-13T07:15:19.300000
CVE-2024-38823,0,0,b63f600119babfcd1b88d3b66789bd9b95c29f7b7675d097c00a7d24aff9b414,2025-06-13T07:15:20.580000
CVE-2024-38824,1,1,54e57dcf925789c6c00c49d9811baccd3488b72aef696e2d154306781f58b0a3,2025-06-13T08:15:18.800000
CVE-2024-38825,0,0,203649d9550a3a16e86d52bd19d99320fe94919f9798485742bccd2920441720,2025-06-13T07:15:20.717000
CVE-2024-38826,0,0,506930d335a5efb8c27d5014fa191907479a7be8d8701e39690034739d2c8ebb,2025-03-17T22:15:12.667000
CVE-2024-38827,0,0,2e81585c986691122bd5b137a7a8366ca83e5bd591adaec79ae968dfb0819731,2025-01-24T20:15:32.553000
CVE-2024-38828,0,0,30ca64d92e91bdd0f728034345a0be072d18df3b4628bfb9f9d8fb65850f39eb,2025-05-09T20:15:38.413000
@ -276811,7 +276812,7 @@ CVE-2024-5558,0,0,27c470fd7893b831fc84cdde276205428cb613b4f465921ca99eb643164424
CVE-2024-55580,0,0,d0db8db8caa9064b5ccfd1ebfcb70a56a05a77720b165abb2a708efdd1b5b12c,2024-12-10T15:15:08.300000
CVE-2024-55581,0,0,c4461aeefe710b8127c139746d541669508c4f036fc04415a5c2df9466c650ae,2025-04-07T18:39:22.837000
CVE-2024-55582,0,0,8c7e64bb3acec7a473c6e65040db0fdec814405cb32a2dc0c98b336fe36f3523,2024-12-11T17:15:21.103000
CVE-2024-55585,0,0,63af7fe272df8dfd7051e22f6478ef78915d30c921c3f7c1479cb5a0fa0f2941,2025-06-09T12:15:47.880000
CVE-2024-55585,0,1,10db4abe2df25dafa61974320d02f386f6536dda492088dc02ec05c47bc9210b,2025-06-13T08:15:19.127000
CVE-2024-55586,0,0,925f554fe1c6418481a3cd536be7ee8d09491d59c7f2a3844aeb8009a61c81a3,2024-12-12T02:08:22.247000
CVE-2024-55587,0,0,043360c021c66dd2c5a5e7aa976c02dd7134a3fcd9d370dcc05a2b2b78d778ba,2024-12-12T17:15:11.197000
CVE-2024-5559,0,0,da875044adc3709281edfed6e696b593f02a48923f7270d2350dbdeb9c3f0186,2024-11-21T09:47:55.840000
@ -279177,7 +279178,7 @@ CVE-2024-6533,0,0,7c76cd0497295bcea8ddaf17ea367bd3231a092d4f1d355ad959ac1bbed5a9
CVE-2024-6534,0,0,77773ba8637f01892ca3f6641fe8442e5c6280672a181b114b53032c7b4aca6d,2025-05-19T19:15:47.540000
CVE-2024-6535,0,0,44388289212b949983bbcb08fc4f387d14a7864b80be8ec8b5ccdce879cce735,2024-11-21T09:49:49.560000
CVE-2024-6536,0,0,9aad41cc349130329c2772e0fffacd9b3eaf7684c2688938e6febfa55873b1aa,2025-06-10T16:01:07.250000
CVE-2024-6538,0,1,6d82343325e81c013352d2562f399e546a618b1a220613b9be07ff00c7b0d628,2025-06-13T06:15:21.310000
CVE-2024-6538,0,0,6d82343325e81c013352d2562f399e546a618b1a220613b9be07ff00c7b0d628,2025-06-13T06:15:21.310000
CVE-2024-6539,0,0,488f82b4dd195018a4571a7b41599ab86771c19553aea6769341658d3043c227,2024-11-21T09:49:50.707000
CVE-2024-6540,0,0,f3ea6a455e292a17968899748da95526cfa3d10fdcac7853f32fce07f60e60be,2024-11-21T09:49:50.857000
CVE-2024-6542,0,0,95c08c38ec0cfe53af1e3f2fc6b95f2c5e43a181678f8155f2d77a836dccc44c,2024-11-21T09:49:50.997000
@ -285594,14 +285595,14 @@ CVE-2025-22231,0,0,bd2ff59ef079880253edeca06616e1c3a205871c44a51a92d95e60e549741
CVE-2025-22232,0,0,bee762df9dfabd3d4c6c12e64136a19453238ca07b81d2e49eee527157bf661b,2025-04-11T15:39:52.920000
CVE-2025-22233,0,0,50310437fe70f8c52d32549c7a5d723959e232fe0d070a21f27a0de47dd17286,2025-05-19T13:35:20.460000
CVE-2025-22235,0,0,9096c227dda3418e3d7b103b041dc8b2cd855202b867daccc1ae1ca882f5e87f,2025-05-16T23:15:19.600000
CVE-2025-22236,1,1,bad9dcdfda94f7a8f14a9c4731a292403c77a2168042ee3ca100497826fa0d7c,2025-06-13T07:15:20.863000
CVE-2025-22237,1,1,ed2d36b751c7eb47c87b1b491b96361d88ded4587852c55ecee7748dce17ebdc,2025-06-13T07:15:21.010000
CVE-2025-22238,1,1,744f7cb49315bcf250df707bd1788f0a0498030a8448d1ac297859a373023324,2025-06-13T07:15:21.150000
CVE-2025-22239,1,1,e8f6f773eb349551c67372dd50e5396f644a698e9473b9dee2f890c0966ae7f9,2025-06-13T07:15:21.290000
CVE-2025-22236,0,0,bad9dcdfda94f7a8f14a9c4731a292403c77a2168042ee3ca100497826fa0d7c,2025-06-13T07:15:20.863000
CVE-2025-22237,0,0,ed2d36b751c7eb47c87b1b491b96361d88ded4587852c55ecee7748dce17ebdc,2025-06-13T07:15:21.010000
CVE-2025-22238,0,0,744f7cb49315bcf250df707bd1788f0a0498030a8448d1ac297859a373023324,2025-06-13T07:15:21.150000
CVE-2025-22239,0,0,e8f6f773eb349551c67372dd50e5396f644a698e9473b9dee2f890c0966ae7f9,2025-06-13T07:15:21.290000
CVE-2025-2224,0,0,a251902d7a3f4027222d02a92ceecc551380ed3d87526ebb058f0bdbf9a04b21,2025-03-27T16:45:46.410000
CVE-2025-22240,1,1,655afd2639c4bff34f05eb0523980a3eb290c4439f682aac852047fd7d81b7d6,2025-06-13T07:15:21.430000
CVE-2025-22241,1,1,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000
CVE-2025-22242,1,1,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000
CVE-2025-22240,0,0,655afd2639c4bff34f05eb0523980a3eb290c4439f682aac852047fd7d81b7d6,2025-06-13T07:15:21.430000
CVE-2025-22241,0,0,5f9646794e52bdbc3f490b3330e1f9c68ea5ffdfa0df29aae7c5e61961ca5b57,2025-06-13T07:15:21.567000
CVE-2025-22242,0,0,b8a6fb1b6e8de9a5a97438f1176658027665c59502c2549ed9c21537b7ef446a,2025-06-13T07:15:21.710000
CVE-2025-22243,0,0,5f41737989264b2994eac99e02c12b9f81310f29baab0cf31082285d453e8c22,2025-06-05T20:12:23.777000
CVE-2025-22244,0,0,936e256b7445af372dfb2e4aaecfd0a0bba17d1084c3b4137448313a9b74ae16,2025-06-05T20:12:23.777000
CVE-2025-22245,0,0,4cf32386b47e50dd7150971af187d1237c885530e9e4973c20a0d2525573c96a,2025-06-05T20:12:23.777000
@ -293451,6 +293452,7 @@ CVE-2025-3645,0,0,5320ad93e35344910c21a67f764477dae50463a61312eda5cb948a8a0d2e4f
CVE-2025-3647,0,0,d085366814e191fa929649b449c3c94db9fdfb290fac2614b251f62d5616efc9,2025-04-29T13:52:28.490000
CVE-2025-3649,0,0,df5be861cb9901de2ff346df6053edd181ced31f9d06ef10ebd9788e09b37197,2025-06-05T14:27:28.437000
CVE-2025-36504,0,0,30afeffa7b8ef5e478f29856811f9be90f1ece9e22dbe373c856a36c842492cb,2025-05-08T14:39:09.683000
CVE-2025-36506,1,1,61b274ed16b988d85df1f6f5598cf0d5025c6ac8685dc33bec7f148d553b5a3f,2025-06-13T09:15:19.223000
CVE-2025-3651,0,0,30e087cb1671b81c1bf0c1d2a4d51e77f706a32948b7aa67dbe7688506dce698,2025-04-17T20:21:48.243000
CVE-2025-36513,0,0,40997ded6ccfa9f42a498c7fa3aba63677e185863eb779042a0e6b33a18b51a9,2025-06-06T14:07:28.330000
CVE-2025-36521,0,0,76dbe5c9e005eebc45d03f4e270884a68d88e62c1e707e433be80dfc20224dd6,2025-05-02T13:52:51.693000
@ -293978,6 +293980,7 @@ CVE-2025-3919,0,0,a87264f5c964c1b9f0e2df5faae10e0481d418f0fb1502b0ee9da33cc507ee
CVE-2025-3921,0,0,9797fba579692252283cd90745f54a1a6a5a7131fc66f684fa524a93339f9b2c,2025-05-07T14:13:20.483000
CVE-2025-3923,0,0,ee152c7f1a42d63e1ca21cb1c49adcbe2fb8c27f05521d2bf1672c2da0c26904,2025-04-29T13:52:28.490000
CVE-2025-3924,0,0,7b87f51ca3c311667e1b7a4df04e30967e599dbb013055d4845862729654e283,2025-05-07T14:13:20.483000
CVE-2025-39240,1,1,a02bb3c33521d2058c91a6ee65ad6c626da80958654a707237bc909c3ce4c2a0,2025-06-13T08:15:19.377000
CVE-2025-3925,0,0,a768d137ba057feede97294fe198f51837b892f84c1c07da5c135848de68ae8c,2025-05-08T14:39:09.683000
CVE-2025-3927,0,0,9e086b56a440dad42f434266e45a7a3a4ae08576665cc376b0af581930ff5e7c,2025-05-12T16:15:24.823000
CVE-2025-3928,0,0,b8f573bcf4c9f6295f3b239508ff59d7f2be020729128e557b8061ff337a956f,2025-05-28T20:51:43.700000
@ -294624,9 +294627,9 @@ CVE-2025-4222,0,0,0ac402cc845bab4a30e9252ea588813619c6f19618452a717b52c67067208b
CVE-2025-4223,0,0,956f48551f11f91b052ecedb14a153aceab464c078b4bc0b79be148ceb74f438,2025-05-28T14:58:52.920000
CVE-2025-4224,0,0,1207737d79a1e90fb6c077a6a1097540732fecbc5b6d096024f04eb01ab32d8d,2025-06-04T14:54:33.783000
CVE-2025-4226,0,0,553848fc8965850ce01d7354687a65a57c667ad58d4e47460cbb85b0387517fd,2025-05-30T10:15:23.343000
CVE-2025-4227,1,1,0cba43ce0ea1b24f0c363631becf569fb38d5a5a4940ee66b41b4dc46019f2a6,2025-06-13T06:15:22.253000
CVE-2025-4227,0,0,0cba43ce0ea1b24f0c363631becf569fb38d5a5a4940ee66b41b4dc46019f2a6,2025-06-13T06:15:22.253000
CVE-2025-4228,0,0,554b1a6f1624f5ff21aabcc2ba5fe6664bfd45b472d87eab77b50fd6cdf9b337,2025-06-13T00:15:23.233000
CVE-2025-4229,1,1,33aa712575cd59bef42cfaeb99480be65618e20d2c90202f86fce4479fe87aa2,2025-06-13T06:15:22.490000
CVE-2025-4229,0,0,33aa712575cd59bef42cfaeb99480be65618e20d2c90202f86fce4479fe87aa2,2025-06-13T06:15:22.490000
CVE-2025-4230,0,0,3bc7d43f6ed17d0222050d5e2a8c149fcb80dc001be4c3f44b9fc2d5f7403e5e,2025-06-13T00:15:23.380000
CVE-2025-4231,0,0,9f35b2b6570c87e4ea9cfe7424c6a624299304be5429d17ab099d4079abf7e0b,2025-06-13T00:15:23.533000
CVE-2025-4232,0,0,7c0d7848e06aeb2ed299e7649a2baf502414476df4b217dd96bdb218f0ad26fa,2025-06-13T00:15:23.697000
@ -295683,6 +295686,7 @@ CVE-2025-4678,0,0,fbec2b4fac1b4284d4d6bf7d8d38e21016c41ff107ed2c39fcea77d9e718a0
CVE-2025-46780,0,0,5993d506455854cf118c6763aa0e87cfcb5c499499a4d09b9c1fb1cc0884d3f3,2025-04-30T03:15:19.307000
CVE-2025-46781,0,0,e7fe47a74e2ae94a42cb82d6842951a5dd9286ffd4d5d353415d63928d0e29b9,2025-04-30T03:15:19.367000
CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d46e,2025-04-30T03:15:19.430000
CVE-2025-46783,1,1,79dd23fc392ca9224d73debad68faec2e14cef78c7ee76ce676f8b53bfd26213,2025-06-13T09:15:19.620000
CVE-2025-46785,0,0,37929d48b75dcb8104d52e2202c99878d7f4f635a8670bbd0e6f5af54cd711d3,2025-05-16T14:43:56.797000
CVE-2025-46786,0,0,65c9b4d28548a814ac9da85c56a6b20b3ea8dfdc3f7521c8b14e0368cd0ae6bc,2025-05-16T14:43:56.797000
CVE-2025-4679,0,0,bd384669d27df6a466ec06c3f367687ccacf0536beef14e450b7ad3bf52b421e,2025-05-30T16:59:38.433000
@ -296807,6 +296811,7 @@ CVE-2025-48798,0,0,3d262ff889de2be849be48f7041ba76705a8181e37409ec772ec9868a5451
CVE-2025-4880,0,0,e66433f376d95dc941d17745f27a53d60427f87111077aee793bacaa1dd21351,2025-05-21T17:33:42.373000
CVE-2025-4881,0,0,3fdda22eaf1afa96c9c6bfb121fd7cc7da116831a6f494c0b7df343d1eed58c4,2025-05-21T19:38:39.660000
CVE-2025-4882,0,0,9ae533a1d17c0bc7b22051d58510b828885d48326cbc794d7bf23ceba43e10c0,2025-05-21T19:38:24.990000
CVE-2025-48825,1,1,48b3b5fd991ab13697bb95c660ad4ff207795a0c3033d56e71348b9e29c61030,2025-06-13T09:15:19.937000
CVE-2025-48827,0,0,bb023efebad659c6b1afc7472a68a4c3fff6995d9544989f2962a9514dad36ed,2025-05-28T15:01:30.720000
CVE-2025-48828,0,0,4552ae9ffef9c0c046834c88e3af4be5924ff2fdbe877524ea921342daa54fb9,2025-05-28T15:01:30.720000
CVE-2025-4883,0,0,5862fdd520821c1eedf697774db7196e34040fbccfc13f239bec6cec686b2e42,2025-05-21T19:38:13.727000
@ -296965,11 +296970,11 @@ CVE-2025-49164,0,0,d5b91c5cc8e76d4adf3dda6a9132b65234dcdefc36da28ceddedfd5530304
CVE-2025-4917,0,0,402a8702a0d07685076d8d3bbf70a58c8189448c063fea494a0fac6dd2626eee,2025-05-19T17:38:05.883000
CVE-2025-4918,0,0,ab4c079e1da6cd4dfa69cf1fcc57b5e852fcef00a973643da3dd71ab3f3ec47e,2025-05-28T14:05:35.853000
CVE-2025-49181,0,0,421c69caf46d64c85211245857cc50240a1d925eb8f7f6f8f8275071dbcea04d,2025-06-12T16:06:20.180000
CVE-2025-49182,0,0,b228a68350a504b8d4e55725ccef9e5f30f958d9e26082e4726cc3fbe2b75558,2025-06-12T16:06:20.180000
CVE-2025-49182,0,1,e8456684e967a6a1e184795e09531c7803eec71e04514d62191e7065481706c5,2025-06-13T09:15:20.130000
CVE-2025-49183,0,0,0715b13572853706431a4f2ccf72fef00b567ab1bb56a0f98125eaa16e7edc70,2025-06-12T16:06:20.180000
CVE-2025-49184,0,0,ac5f9f795f8fac1c8e62e088fdf037968bc9dd920d64a50e4f3ea2d60cc6426d,2025-06-12T16:06:20.180000
CVE-2025-49185,0,0,52f282a54651fac26d2b1ee3543089c47b19de82c1921b62b8ffa20986027a4f,2025-06-12T16:06:20.180000
CVE-2025-49186,0,0,e4f674c86e56b544e87225c7a880125861a5b536cbee59fdd4b75e2f98be7cf5,2025-06-12T16:06:20.180000
CVE-2025-49186,0,1,c8042f20acd2791cc3b5da99e19e07f5d6fbc0915e5cd25afe7afe103152a819,2025-06-13T09:15:20.383000
CVE-2025-49187,0,0,90298c6f8b259851242ec73ce90475e67ee1e00f0f2579b08964c04f82fdf639,2025-06-12T16:06:20.180000
CVE-2025-49188,0,0,a04bcc69ec9cf5c0efb712f09d6662a98ccaa8679363aa5e4bff3f4db4d943c9,2025-06-12T16:06:20.180000
CVE-2025-49189,0,0,0be5e382e2cc60d0e0c5db11200b14429dfc5194d0e7d82700ed04155f015c1b,2025-06-12T16:06:20.180000
@ -297828,7 +297833,7 @@ CVE-2025-5915,0,0,f4817e3f541276db8764595bab47239f1072f31f9c3d32c2caaee3b4950d68
CVE-2025-5916,0,0,77a227907bb56f71f2bfd1bf497899ff1c8f6eb6d2e97956e9c7ee1b79bfbd3d,2025-06-12T16:06:47.857000
CVE-2025-5917,0,0,0b15f8cb6694a25438c80b55bb7a5b265e6faccf484d04cd7c6d5563268713ff,2025-06-12T16:06:47.857000
CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d2b,2025-06-12T16:06:47.857000
CVE-2025-5923,1,1,06760bc3ae67f1377b7c585ea87c8574a8ff4adaf2fbc96f96b691766f0da645,2025-06-13T07:15:22.663000
CVE-2025-5923,0,0,06760bc3ae67f1377b7c585ea87c8574a8ff4adaf2fbc96f96b691766f0da645,2025-06-13T07:15:22.663000
CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000
CVE-2025-5926,0,0,94cd88fd66ed5a9ceb11b9934130bbfb9f0b2ce3f9af019f4e0e6711d07447ff,2025-06-13T03:15:52.607000
CVE-2025-5928,0,0,9a32f510da05cddff71ada044b658dc0f190971da9131d5047326ff61f5af886,2025-06-13T03:15:52.767000
@ -297869,5 +297874,6 @@ CVE-2025-6006,0,0,f3890d678b52a65bb188746bd2b72b04830e80f4fcc6e370b4f5f482a5c894
CVE-2025-6007,0,0,0a6b30e00b610d68c64f9ae664f6748f210976b9ca69a527a02472b830ffa838,2025-06-12T16:06:20.180000
CVE-2025-6008,0,0,bdfd3cc3e4441917f3e7587cffe8368d1b175ba60e9dbe2f7dbae2a1b2f94481,2025-06-12T16:06:20.180000
CVE-2025-6009,0,0,45d2cd3c349eec086d7dbf8e5d3677c0ad4a90d0009e476cec317ccc54ba0f3a,2025-06-12T16:06:20.180000
CVE-2025-6012,1,1,85bb11daadd2c9711de1e56ddc8b0e0022d882d1b7428575f169e5e84f349018,2025-06-13T08:15:19.507000
CVE-2025-6021,0,0,d8cb911042c78ed7473b58fa173a0ecc04974b2be82b9747683ed0cea25a5aba,2025-06-12T16:06:20.180000
CVE-2025-6031,0,0,f55877d9a515055d82923e15e107b73e885b2a97ca1430544a245162a02b6450,2025-06-12T20:15:22.450000

Can't render this file because it is too large.