Auto-Update: 2025-06-10T02:00:19.762752+00:00

This commit is contained in:
cad-safe-bot 2025-06-10 02:03:58 +00:00
parent 8b4b60888f
commit 422e563e60
46 changed files with 2733 additions and 143 deletions

View File

@ -2,8 +2,8 @@
"id": "CVE-2023-40000", "id": "CVE-2023-40000",
"sourceIdentifier": "audit@patchstack.com", "sourceIdentifier": "audit@patchstack.com",
"published": "2024-04-16T18:15:10.600", "published": "2024-04-16T18:15:10.600",
"lastModified": "2024-11-21T08:18:30.070", "lastModified": "2025-06-10T01:12:58.563",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -36,6 +36,26 @@
}, },
"exploitabilityScore": 3.9, "exploitabilityScore": 3.9,
"impactScore": 3.7 "impactScore": 3.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
} }
] ]
}, },
@ -51,18 +71,45 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:litespeedtech:litespeed_cache:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "5.7.0.1",
"matchCriteriaId": "967FB0CF-DC74-4455-8237-A277E95FE632"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve",
"source": "audit@patchstack.com" "source": "audit@patchstack.com",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve", "url": "https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/rxerium/CVE-2023-40000", "url": "https://github.com/rxerium/CVE-2023-40000",
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0" "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-1526", "id": "CVE-2024-1526",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-01T05:15:07.797", "published": "2024-04-01T05:15:07.797",
"lastModified": "2025-03-20T20:15:30.910", "lastModified": "2025-06-10T00:50:39.620",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:devpups:social_pug:*:*:*:*:*:wordpress:*:*",
"versionEndExcluding": "1.33.1",
"matchCriteriaId": "7F6BD061-62BC-4D63-AD8E-24615BA18EFA"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/", "url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/", "url": "https://wpscan.com/vulnerability/1664697e-0ea3-4d09-b2fd-153a104ec255/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-24272", "id": "CVE-2024-24272",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-21T22:15:10.850", "published": "2024-03-21T22:15:10.850",
"lastModified": "2025-03-27T20:15:23.717", "lastModified": "2025-06-10T00:55:42.550",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,40 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:itopvpn:dualsafe_password_manager:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.4.24",
"matchCriteriaId": "8C299234-0F50-43F6-B46A-4C493BB1D180"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/", "url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/", "url": "https://research.hisolutions.com/2024/03/cve-2024-24272-dualsafe-password-manager-leaks-credentials/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-25187", "id": "CVE-2024-25187",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-02T04:15:12.203", "published": "2024-04-02T04:15:12.203",
"lastModified": "2024-11-21T09:00:24.440", "lastModified": "2025-06-10T00:46:34.737",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,22 +51,53 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:xiaocheng-keji:71cms:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E09F8EB1-67B4-40FF-AB07-B5015654935B"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c", "url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/xiaocheng-keji/71cms/issues/2", "url": "https://github.com/xiaocheng-keji/71cms/issues/2",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
}, },
{ {
"url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c", "url": "https://gist.github.com/wisejayer/d365e93ce09b8a36641165e1d1a0a06c",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/xiaocheng-keji/71cms/issues/2", "url": "https://github.com/xiaocheng-keji/71cms/issues/2",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-27309", "id": "CVE-2024-27309",
"sourceIdentifier": "security@apache.org", "sourceIdentifier": "security@apache.org",
"published": "2024-04-12T07:15:08.560", "published": "2024-04-12T07:15:08.560",
"lastModified": "2025-02-13T18:17:28.160", "lastModified": "2025-06-10T00:59:50.953",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,30 +51,71 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:apache:kafka:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.0",
"versionEndIncluding": "3.6.1",
"matchCriteriaId": "CA81784F-A227-4DFE-8711-840EB6031279"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/3", "url": "http://www.openwall.com/lists/oss-security/2024/04/12/3",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy", "url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20240705-0002/", "url": "https://security.netapp.com/advisory/ntap-20240705-0002/",
"source": "security@apache.org" "source": "security@apache.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "http://www.openwall.com/lists/oss-security/2024/04/12/3", "url": "http://www.openwall.com/lists/oss-security/2024/04/12/3",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
]
}, },
{ {
"url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy", "url": "https://lists.apache.org/thread/6536rmzyg076lzzdw2xdktvnz163mjpy",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
]
}, },
{ {
"url": "https://security.netapp.com/advisory/ntap-20240705-0002/", "url": "https://security.netapp.com/advisory/ntap-20240705-0002/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28458", "id": "CVE-2024-28458",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-11T21:15:08.077", "published": "2024-04-11T21:15:08.077",
"lastModified": "2024-11-21T09:06:24.153", "lastModified": "2025-06-10T01:01:30.743",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,37 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:swftools:swftools:0.9.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B6149BA0-2082-45B7-9B43-CAC2F1768770"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc", "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc", "url": "https://github.com/keepinggg/poc/blob/main/poc_of_swfc",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28714", "id": "CVE-2024-28714",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-03-28T23:15:46.410", "published": "2024-03-28T23:15:46.410",
"lastModified": "2024-11-21T09:06:48.243", "lastModified": "2025-06-10T00:54:10.907",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,42 +51,89 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:crmeb:crmeb_java:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1.3.4",
"matchCriteriaId": "7B87506E-26F7-4CA1-A01B-16898322A42D"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "http://crmebjava.com", "url": "http://crmebjava.com",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://gitee.com/ZhongBangKeJi/crmeb_java", "url": "https://gitee.com/ZhongBangKeJi/crmeb_java",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md", "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png", "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "http://crmebjava.com", "url": "http://crmebjava.com",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Permissions Required"
]
}, },
{ {
"url": "https://gitee.com/ZhongBangKeJi/crmeb_java", "url": "https://gitee.com/ZhongBangKeJi/crmeb_java",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md", "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/1.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png", "url": "https://github.com/JiangXiaoBaiJia/cve2/blob/main/a.png",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://www.vicarius.io/vsociety/posts/ssti-in-mblog-351-a-tale-of-a-glorified-rce-cve-2024-28713-28714", "url": "https://www.vicarius.io/vsociety/posts/ssti-in-mblog-351-a-tale-of-a-glorified-rce-cve-2024-28713-28714",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-28755", "id": "CVE-2024-28755",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T03:15:10.140", "published": "2024-04-03T03:15:10.140",
"lastModified": "2024-11-21T09:06:54.030", "lastModified": "2025-06-10T00:41:15.783",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,38 +51,81 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:arm:mbed_tls:*:*:*:*:*:*:*:*",
"versionStartIncluding": "3.5.0",
"versionEndIncluding": "3.6.0",
"matchCriteriaId": "EB2A3689-7273-4428-841D-54E11694CB71"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0", "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Release Notes"
]
}, },
{ {
"url": "https://github.com/hey3e", "url": "https://github.com/hey3e",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}, },
{ {
"url": "https://hey3e.github.io", "url": "https://hey3e.github.io",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Not Applicable"
]
}, },
{ {
"url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0", "url": "https://github.com/Mbed-TLS/mbedtls/releases/tag/v3.6.0",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Release Notes"
]
}, },
{ {
"url": "https://github.com/hey3e", "url": "https://github.com/hey3e",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
}, },
{ {
"url": "https://hey3e.github.io", "url": "https://hey3e.github.io",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Not Applicable"
]
}, },
{ {
"url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/", "url": "https://mbed-tls.readthedocs.io/en/latest/tech-updates/security-advisories/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-3075", "id": "CVE-2024-3075",
"sourceIdentifier": "contact@wpscan.com", "sourceIdentifier": "contact@wpscan.com",
"published": "2024-04-26T05:15:50.433", "published": "2024-04-26T05:15:50.433",
"lastModified": "2025-03-27T15:15:53.037", "lastModified": "2025-06-10T01:23:11.353",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -39,14 +39,52 @@
} }
] ]
}, },
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mmilan81:mm-email2image:*:*:*:*:*:*:*:*",
"versionEndIncluding": "0.2.5",
"matchCriteriaId": "F850D534-0620-4073-B5C7-B2FCF40B3FE8"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/", "url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/",
"source": "contact@wpscan.com" "source": "contact@wpscan.com",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/", "url": "https://wpscan.com/vulnerability/450375f6-a9d4-49f6-8bab-867774372795/",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31013", "id": "CVE-2024-31013",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-03T04:15:12.907", "published": "2024-04-03T04:15:12.907",
"lastModified": "2025-03-17T16:15:21.610", "lastModified": "2025-06-10T01:04:27.800",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,41 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emlog:emlog:2.3.0:*:*:*:pro:*:*:*",
"matchCriteriaId": "D51AF99B-7574-4222-A2A2-C1ECC9BE8E51"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/emlog/emlog/issues/291", "url": "https://github.com/emlog/emlog/issues/291",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
}, },
{ {
"url": "https://github.com/emlog/emlog/issues/291", "url": "https://github.com/emlog/emlog/issues/291",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Vendor Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31036", "id": "CVE-2024-31036",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-22T22:15:07.400", "published": "2024-04-22T22:15:07.400",
"lastModified": "2024-11-21T09:12:45.570", "lastModified": "2025-06-10T01:30:34.650",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/nanomq/nanomq/issues/1722", "url": "https://github.com/nanomq/nanomq/issues/1722",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}, },
{ {
"url": "https://github.com/nanomq/nanomq/issues/1722", "url": "https://github.com/nanomq/nanomq/issues/1722",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31040", "id": "CVE-2024-31040",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.680", "published": "2024-04-17T19:15:07.680",
"lastModified": "2024-11-21T09:12:45.783", "lastModified": "2025-06-10T01:38:19.090",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/nanomq/nanomq/issues/1720", "url": "https://github.com/nanomq/nanomq/issues/1720",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}, },
{ {
"url": "https://github.com/nanomq/nanomq/issues/1720", "url": "https://github.com/nanomq/nanomq/issues/1720",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31041", "id": "CVE-2024-31041",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.733", "published": "2024-04-17T19:15:07.733",
"lastModified": "2024-11-21T09:12:45.993", "lastModified": "2025-06-10T01:35:36.873",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,39 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:emqx:nanomq:0.21.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AF5103CA-7146-46E2-9B11-06A455EFA96C"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/nanomq/nanomq/issues/1723", "url": "https://github.com/nanomq/nanomq/issues/1723",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking"
]
}, },
{ {
"url": "https://github.com/nanomq/nanomq/issues/1723", "url": "https://github.com/nanomq/nanomq/issues/1723",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31583", "id": "CVE-2024-31583",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-17T19:15:07.950", "published": "2024-04-17T19:15:07.950",
"lastModified": "2024-11-21T09:13:43.540", "lastModified": "2025-06-10T01:33:43.180",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,30 +51,66 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:linuxfoundation:pytorch:*:*:*:*:*:python:*:*",
"versionEndExcluding": "2.2.0",
"matchCriteriaId": "CA1ACB1F-9056-4D41-A8C8-33921420D4C2"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176", "url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132", "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2", "url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Patch"
]
}, },
{ {
"url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176", "url": "https://gist.github.com/1047524396/43e19a41f2b36503a4a228c32cdbc176",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132", "url": "https://github.com/pytorch/pytorch/blob/v2.1.2/torch/csrc/jit/mobile/interpreter.cpp#L132",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Product"
]
}, },
{ {
"url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2", "url": "https://github.com/pytorch/pytorch/commit/9c7071b0e324f9fb68ab881283d6b8d388a4bcd2",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31750", "id": "CVE-2024-31750",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-19T00:15:10.690", "published": "2024-04-19T00:15:10.690",
"lastModified": "2024-11-21T09:13:50.730", "lastModified": "2025-06-10T01:32:26.340",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,51 @@
] ]
} }
], ],
"configurations": [
{
"operator": "AND",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:f-logic:datacube3_firmware:1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1F73E586-1AD1-4280-B63B-CFB91BD33BF0"
}
]
},
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": false,
"criteria": "cpe:2.3:h:f-logic:datacube3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C0F1221C-A9CB-4625-AABD-2E4890FA6E93"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md", "url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Broken Link",
"Exploit"
]
}, },
{ {
"url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md", "url": "https://github.com/lampSEC/semcms/blob/main/datacube3.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Broken Link",
"Exploit"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31783", "id": "CVE-2024-31783",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-16T04:15:09.140", "published": "2024-04-16T04:15:09.140",
"lastModified": "2025-03-13T16:15:19.433", "lastModified": "2025-06-10T01:19:10.013",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,40 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.6.7",
"matchCriteriaId": "EBA5590F-3A15-40CF-AC36-6CBA8C128D19"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md", "url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
]
}, },
{ {
"url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md", "url": "https://github.com/0x0fc/TyporaXSS/blob/main/TyporaXSS.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
]
} }
] ]
} }

View File

@ -2,8 +2,8 @@
"id": "CVE-2024-31784", "id": "CVE-2024-31784",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-04-16T04:15:09.200", "published": "2024-04-16T04:15:09.200",
"lastModified": "2024-11-21T09:13:52.640", "lastModified": "2025-06-10T01:14:55.257",
"vulnStatus": "Undergoing Analysis", "vulnStatus": "Analyzed",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
@ -51,14 +51,38 @@
] ]
} }
], ],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:typora:typora:*:*:*:*:*:*:*:*",
"versionEndIncluding": "1.8.10",
"matchCriteriaId": "F8545FD7-B699-47D5-A63C-8E58D663FA00"
}
]
}
]
}
],
"references": [ "references": [
{ {
"url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md", "url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md",
"source": "cve@mitre.org" "source": "cve@mitre.org",
"tags": [
"Exploit"
]
}, },
{ {
"url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md", "url": "https://github.com/0x0fc/TyporaIframe/blob/main/TyporaIframeVuln.md",
"source": "af854a3a-2127-422b-91ae-364da2661108" "source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit"
]
} }
] ]
} }

View File

@ -2,7 +2,7 @@
"id": "CVE-2024-42009", "id": "CVE-2024-42009",
"sourceIdentifier": "cve@mitre.org", "sourceIdentifier": "cve@mitre.org",
"published": "2024-08-05T19:15:38.220", "published": "2024-08-05T19:15:38.220",
"lastModified": "2025-03-13T16:15:21.467", "lastModified": "2025-06-10T01:00:02.087",
"vulnStatus": "Modified", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -59,6 +59,10 @@
} }
] ]
}, },
"cisaExploitAdd": "2025-06-09",
"cisaActionDue": "2025-06-30",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "RoundCube Webmail Cross-Site Scripting Vulnerability",
"weaknesses": [ "weaknesses": [
{ {
"source": "nvd@nist.gov", "source": "nvd@nist.gov",

View File

@ -0,0 +1,72 @@
{
"id": "CVE-2025-0036",
"sourceIdentifier": "psirt@amd.com",
"published": "2025-06-10T00:15:21.197",
"lastModified": "2025-06-10T00:15:21.197",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In AMD Versal Adaptive SoC devices, the incorrect configuration of the SSS during runtime (post-boot) cryptographic operations could cause data to be incorrectly written to and read from invalid locations as well as returning incorrect cryptographic data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N",
"baseScore": 3.2,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.5,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-497"
},
{
"lang": "en",
"value": "CWE-682"
},
{
"lang": "en",
"value": "CWE-772"
},
{
"lang": "en",
"value": "CWE-940"
},
{
"lang": "en",
"value": "CWE-941"
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8011.html",
"source": "psirt@amd.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-0037",
"sourceIdentifier": "psirt@amd.com",
"published": "2025-06-10T00:15:22.103",
"lastModified": "2025-06-10T00:15:22.103",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "psirt@amd.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-20"
}
]
}
],
"references": [
{
"url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html",
"source": "psirt@amd.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-23192",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:20.847",
"lastModified": "2025-06-10T01:15:20.847",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP BusinessObjects Business Intelligence (BI Workspace) allows an unauthenticated attacker to craft and store malicious script within a workspace. When the victim accesses the workspace, the script will execute in their browser enabling the attacker to potentially access sensitive session information, modify or make browser information unavailable. This leads to a high impact on confidentiality and low impact on integrity, availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"baseScore": 8.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.3,
"impactScore": 5.3
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3560693",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-31325",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.060",
"lastModified": "2025-06-10T01:15:21.060",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a Cross-Site Scripting vulnerability in SAP NetWeaver (ABAP Keyword Documentation), an unauthenticated attacker could inject malicious JavaScript into a web page through an unprotected parameter. When a victim accesses the affected page, the script executes in their browser, providing the attacker limited access to restricted information. The vulnerability does not affect data integrity or availability and operates entirely within the context of the client's browser."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3590887",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-32433", "id": "CVE-2025-32433",
"sourceIdentifier": "security-advisories@github.com", "sourceIdentifier": "security-advisories@github.com",
"published": "2025-04-16T22:15:14.373", "published": "2025-04-16T22:15:14.373",
"lastModified": "2025-04-25T23:15:16.993", "lastModified": "2025-06-10T01:00:02.087",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -39,6 +39,10 @@
} }
] ]
}, },
"cisaExploitAdd": "2025-06-09",
"cisaActionDue": "2025-06-30",
"cisaRequiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
"cisaVulnerabilityName": "Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability",
"weaknesses": [ "weaknesses": [
{ {
"source": "security-advisories@github.com", "source": "security-advisories@github.com",

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42977",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.220",
"lastModified": "2025-06-10T01:15:21.220",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP NetWeaver Visual Composer contains a Directory Traversal vulnerability caused by insufficient validation of input paths provided by a high-privileged user. This allows an attacker to read or modify arbitrary files, resulting in a high impact on confidentiality and a low impact on integrity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-22"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3610591",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42982",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.383",
"lastModified": "2025-06-10T01:15:21.383",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP GRC allows a non-administrative user to access and initiate transaction which could allow them to modify or control the transmitted system credentials. This causes high impact on confidentiality, integrity and availability of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3609271",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42983",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.537",
"lastModified": "2025-06-10T01:15:21.537",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Business Warehouse and SAP Plug-In Basis allows an authenticated attacker to drop arbitrary SAP database tables, potentially resulting in a loss of data or rendering the system unusable. On successful exploitation, an attacker can completely delete database entries but is not able to read any data."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:H",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 4.7
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3606484",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42984",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.703",
"lastModified": "2025-06-10T01:15:21.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP S/4HANA Manage Central Purchase Contract does not perform necessary authorization checks for an authenticated user. Due to this, an attacker could execute the function import on the entity making it inaccessible for unrestricted user. This has low impact on confidentiality and availability of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 2.5
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3441087",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42987",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:21.860",
"lastModified": "2025-06-10T01:15:21.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP Manage Processing Rules (For Bank Statement) allows an attacker with basic privileges to edit shared rules of any user by tampering the request parameter. Due to missing authorization check, the attacker can edit rules that should be restricted, compromising the integrity of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3596850",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42988",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.023",
"lastModified": "2025-06-10T01:15:22.023",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Under certain conditions, SAP Business Objects Business Intelligence Platform allows an unauthenticated attacker to enumerate HTTP endpoints in the internal network by specially crafting HTTP requests. This disclosure of information could further enable the researcher to cause SSRF. It has no impact on integrity and availability of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-918"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3585545",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42989",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.183",
"lastModified": "2025-06-10T01:15:22.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RFC inbound processing\ufffddoes not perform necessary authorization checks for an authenticated user, resulting in escalation of privileges. On successful exploitation the attacker could critically impact both integrity and availability of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.1,
"impactScore": 5.8
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3600840",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42990",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.340",
"lastModified": "2025-06-10T01:15:22.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Unprotected SAPUI5 applications allow an attacker with basic privileges to inject malicious HTML code into a webpage, with the goal of redirecting users to the attacker controlled URL. This issue could impact the integrity of the application. Confidentiality or Availability are not impacted."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:N",
"baseScore": 3.0,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.3,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3601169",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42991",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.507",
"lastModified": "2025-06-10T01:15:22.507",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP S/4HANA (Bank Account Application) does not perform necessary authorization checks. This allows an authenticated 'approver' user to delete attachment from bank account application of other user, leading to a low impact on integrity, with no impact on the confidentiality of the data or the availability of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3608058",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42993",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.667",
"lastModified": "2025-06-10T01:15:22.667",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Due to a missing authorization check vulnerability in SAP S/4HANA (Enterprise Event Enablement), an attacker with access to the Inbound Binding Configuration could create an RFC destination and assign an arbitrary high-privilege user. This allows the attacker to consume events via the RFC destination, leading to code execution under the privileges of the assigned high-privilege user. While the vulnerability has a low impact on Availability, it significantly poses a high risk to both Confidentiality and Integrity."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:L",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.2,
"impactScore": 5.5
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3580384",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42994",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.823",
"lastModified": "2025-06-10T01:15:22.823",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP MDM Server ReadString function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-590"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3610006",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42995",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:22.980",
"lastModified": "2025-06-10T01:15:22.980",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP MDM Server Read function allows an attacker to send specially crafted packets which could trigger a memory read access violation in the server process that would then fail and exit unexpectedly causing high impact on availability with no impact on confidentiality and integrity of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-590"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3610006",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42996",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:23.143",
"lastModified": "2025-06-10T01:15:23.143",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SAP MDM Server allows an attacker to gain control of existing client sessions and execute certain functions without having to re-authenticate giving the ability to access or modify non-sensitive information or consume sufficient resources which could degrade the performance of the server causing low impact on confidentiality, integrity and availibility of the application."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-590"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3610006",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-42998",
"sourceIdentifier": "cna@sap.com",
"published": "2025-06-10T01:15:23.307",
"lastModified": "2025-06-10T01:15:23.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The security settings in the SAP Business One Integration Framework are not adequately checked, allowing attackers to bypass the 403 Forbidden error and access restricted pages. This leads to low impact on confidentiality of the application, there is no impact on integrity and availability."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "cna@sap.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "cna@sap.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
],
"references": [
{
"url": "https://me.sap.com/notes/3594258",
"source": "cna@sap.com"
},
{
"url": "https://url.sap/sapsecuritypatchday",
"source": "cna@sap.com"
}
]
}

View File

@ -2,7 +2,7 @@
"id": "CVE-2025-4318", "id": "CVE-2025-4318",
"sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5", "sourceIdentifier": "ff89ba41-3aa1-4d27-914a-91399e9639e5",
"published": "2025-05-05T19:15:57.847", "published": "2025-05-05T19:15:57.847",
"lastModified": "2025-05-05T20:54:19.760", "lastModified": "2025-06-10T01:15:23.483",
"vulnStatus": "Awaiting Analysis", "vulnStatus": "Awaiting Analysis",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
@ -77,6 +77,14 @@
{ {
"url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-010/", "url": "https://aws.amazon.com/security/security-bulletins/AWS-2025-010/",
"source": "ff89ba41-3aa1-4d27-914a-91399e9639e5" "source": "ff89ba41-3aa1-4d27-914a-91399e9639e5"
},
{
"url": "https://blog.securelayer7.net/cve-2025-4318-aws-amplify-rce/",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://github.com/aws-amplify/amplify-codegen-ui/security/advisories/GHSA-hf3j-86p7-mfw8",
"source": "af854a3a-2127-422b-91ae-364da2661108"
} }
] ]
} }

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5903",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T00:15:22.243",
"lastModified": "2025-06-10T00:15:22.243",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been classified as critical. Affected is the function setWiFiAclRules of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument desc leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiAclRules-20bdf0aa118580399a8df6ba2a44c197",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311676",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311676",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592247",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5904",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T00:15:22.453",
"lastModified": "2025-06-10T00:15:22.453",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been declared as critical. Affected by this vulnerability is the function setWiFiMeshName of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument device_name leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiMeshName-20bdf0aa1185806eb922dbd496c4a4b4",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311677",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311677",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592264",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5905",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T00:15:22.653",
"lastModified": "2025-06-10T00:15:22.653",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK T10 4.1.8cu.5207. It has been rated as critical. Affected by this issue is the function setWiFiRepeaterCfg of the file /cgi-bin/cstecgi.cgi of the component POST Request Handler. The manipulation of the argument Password leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://candle-throne-f75.notion.site/TOTOLINK-T10-setWiFiRepeaterCfg-20bdf0aa118580bd8cd0da62d4d2e47f?pvs=73",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311678",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311678",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592265",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5906",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T01:15:23.720",
"lastModified": "2025-06-10T01:15:23.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Laundry System 1.0. This affects an unknown part of the file /data/. The manipulation leads to missing authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-287"
},
{
"lang": "en",
"value": "CWE-306"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/11",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311679",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311679",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592266",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5907",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T01:15:23.963",
"lastModified": "2025-06-10T01:15:23.963",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This vulnerability affects unknown code of the file /boafrm/formFilter of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve2/blob/main/3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311680",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311680",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592267",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5908",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-10T01:15:24.167",
"lastModified": "2025-06-10T01:15:24.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in TOTOLINK EX1200T up to 4.1.2cu.5232_B20210713. This issue affects some unknown processing of the file /boafrm/formIpQoS of the component HTTP POST Request Handler. The manipulation leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve2/blob/main/4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311681",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311681",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592269",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-06-09T23:55:19.720674+00:00 2025-06-10T02:00:19.762752+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-06-09T23:15:22.617000+00:00 2025-06-10T01:38:19.090000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -27,36 +27,69 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest) Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain ```plain
2025-06-09T00:00:04.329312+00:00 2025-06-10T00:00:04.330516+00:00
``` ```
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
297187 297211
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `11` Recently added CVEs: `24`
- [CVE-2025-26468](CVE-2025/CVE-2025-264xx/CVE-2025-26468.json) (`2025-06-09T23:15:21.753`) - [CVE-2025-0036](CVE-2025/CVE-2025-00xx/CVE-2025-0036.json) (`2025-06-10T00:15:21.197`)
- [CVE-2025-30183](CVE-2025/CVE-2025-301xx/CVE-2025-30183.json) (`2025-06-09T23:15:21.947`) - [CVE-2025-0037](CVE-2025/CVE-2025-00xx/CVE-2025-0037.json) (`2025-06-10T00:15:22.103`)
- [CVE-2025-30184](CVE-2025/CVE-2025-301xx/CVE-2025-30184.json) (`2025-06-09T22:15:21.440`) - [CVE-2025-23192](CVE-2025/CVE-2025-231xx/CVE-2025-23192.json) (`2025-06-10T01:15:20.847`)
- [CVE-2025-30507](CVE-2025/CVE-2025-305xx/CVE-2025-30507.json) (`2025-06-09T23:15:22.110`) - [CVE-2025-31325](CVE-2025/CVE-2025-313xx/CVE-2025-31325.json) (`2025-06-10T01:15:21.060`)
- [CVE-2025-30515](CVE-2025/CVE-2025-305xx/CVE-2025-30515.json) (`2025-06-09T23:15:22.273`) - [CVE-2025-42977](CVE-2025/CVE-2025-429xx/CVE-2025-42977.json) (`2025-06-10T01:15:21.220`)
- [CVE-2025-49140](CVE-2025/CVE-2025-491xx/CVE-2025-49140.json) (`2025-06-09T22:15:22.153`) - [CVE-2025-42982](CVE-2025/CVE-2025-429xx/CVE-2025-42982.json) (`2025-06-10T01:15:21.383`)
- [CVE-2025-5898](CVE-2025/CVE-2025-58xx/CVE-2025-5898.json) (`2025-06-09T22:15:22.327`) - [CVE-2025-42983](CVE-2025/CVE-2025-429xx/CVE-2025-42983.json) (`2025-06-10T01:15:21.537`)
- [CVE-2025-5899](CVE-2025/CVE-2025-58xx/CVE-2025-5899.json) (`2025-06-09T22:15:22.557`) - [CVE-2025-42984](CVE-2025/CVE-2025-429xx/CVE-2025-42984.json) (`2025-06-10T01:15:21.703`)
- [CVE-2025-5900](CVE-2025/CVE-2025-59xx/CVE-2025-5900.json) (`2025-06-09T22:15:22.790`) - [CVE-2025-42987](CVE-2025/CVE-2025-429xx/CVE-2025-42987.json) (`2025-06-10T01:15:21.860`)
- [CVE-2025-5901](CVE-2025/CVE-2025-59xx/CVE-2025-5901.json) (`2025-06-09T23:15:22.433`) - [CVE-2025-42988](CVE-2025/CVE-2025-429xx/CVE-2025-42988.json) (`2025-06-10T01:15:22.023`)
- [CVE-2025-5902](CVE-2025/CVE-2025-59xx/CVE-2025-5902.json) (`2025-06-09T23:15:22.617`) - [CVE-2025-42989](CVE-2025/CVE-2025-429xx/CVE-2025-42989.json) (`2025-06-10T01:15:22.183`)
- [CVE-2025-42990](CVE-2025/CVE-2025-429xx/CVE-2025-42990.json) (`2025-06-10T01:15:22.340`)
- [CVE-2025-42991](CVE-2025/CVE-2025-429xx/CVE-2025-42991.json) (`2025-06-10T01:15:22.507`)
- [CVE-2025-42993](CVE-2025/CVE-2025-429xx/CVE-2025-42993.json) (`2025-06-10T01:15:22.667`)
- [CVE-2025-42994](CVE-2025/CVE-2025-429xx/CVE-2025-42994.json) (`2025-06-10T01:15:22.823`)
- [CVE-2025-42995](CVE-2025/CVE-2025-429xx/CVE-2025-42995.json) (`2025-06-10T01:15:22.980`)
- [CVE-2025-42996](CVE-2025/CVE-2025-429xx/CVE-2025-42996.json) (`2025-06-10T01:15:23.143`)
- [CVE-2025-42998](CVE-2025/CVE-2025-429xx/CVE-2025-42998.json) (`2025-06-10T01:15:23.307`)
- [CVE-2025-5903](CVE-2025/CVE-2025-59xx/CVE-2025-5903.json) (`2025-06-10T00:15:22.243`)
- [CVE-2025-5904](CVE-2025/CVE-2025-59xx/CVE-2025-5904.json) (`2025-06-10T00:15:22.453`)
- [CVE-2025-5905](CVE-2025/CVE-2025-59xx/CVE-2025-5905.json) (`2025-06-10T00:15:22.653`)
- [CVE-2025-5906](CVE-2025/CVE-2025-59xx/CVE-2025-5906.json) (`2025-06-10T01:15:23.720`)
- [CVE-2025-5907](CVE-2025/CVE-2025-59xx/CVE-2025-5907.json) (`2025-06-10T01:15:23.963`)
- [CVE-2025-5908](CVE-2025/CVE-2025-59xx/CVE-2025-5908.json) (`2025-06-10T01:15:24.167`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `0` Recently modified CVEs: `20`
- [CVE-2023-40000](CVE-2023/CVE-2023-400xx/CVE-2023-40000.json) (`2025-06-10T01:12:58.563`)
- [CVE-2024-1526](CVE-2024/CVE-2024-15xx/CVE-2024-1526.json) (`2025-06-10T00:50:39.620`)
- [CVE-2024-24272](CVE-2024/CVE-2024-242xx/CVE-2024-24272.json) (`2025-06-10T00:55:42.550`)
- [CVE-2024-25187](CVE-2024/CVE-2024-251xx/CVE-2024-25187.json) (`2025-06-10T00:46:34.737`)
- [CVE-2024-27309](CVE-2024/CVE-2024-273xx/CVE-2024-27309.json) (`2025-06-10T00:59:50.953`)
- [CVE-2024-28458](CVE-2024/CVE-2024-284xx/CVE-2024-28458.json) (`2025-06-10T01:01:30.743`)
- [CVE-2024-28714](CVE-2024/CVE-2024-287xx/CVE-2024-28714.json) (`2025-06-10T00:54:10.907`)
- [CVE-2024-28755](CVE-2024/CVE-2024-287xx/CVE-2024-28755.json) (`2025-06-10T00:41:15.783`)
- [CVE-2024-3075](CVE-2024/CVE-2024-30xx/CVE-2024-3075.json) (`2025-06-10T01:23:11.353`)
- [CVE-2024-31013](CVE-2024/CVE-2024-310xx/CVE-2024-31013.json) (`2025-06-10T01:04:27.800`)
- [CVE-2024-31036](CVE-2024/CVE-2024-310xx/CVE-2024-31036.json) (`2025-06-10T01:30:34.650`)
- [CVE-2024-31040](CVE-2024/CVE-2024-310xx/CVE-2024-31040.json) (`2025-06-10T01:38:19.090`)
- [CVE-2024-31041](CVE-2024/CVE-2024-310xx/CVE-2024-31041.json) (`2025-06-10T01:35:36.873`)
- [CVE-2024-31583](CVE-2024/CVE-2024-315xx/CVE-2024-31583.json) (`2025-06-10T01:33:43.180`)
- [CVE-2024-31750](CVE-2024/CVE-2024-317xx/CVE-2024-31750.json) (`2025-06-10T01:32:26.340`)
- [CVE-2024-31783](CVE-2024/CVE-2024-317xx/CVE-2024-31783.json) (`2025-06-10T01:19:10.013`)
- [CVE-2024-31784](CVE-2024/CVE-2024-317xx/CVE-2024-31784.json) (`2025-06-10T01:14:55.257`)
- [CVE-2024-42009](CVE-2024/CVE-2024-420xx/CVE-2024-42009.json) (`2025-06-10T01:00:02.087`)
- [CVE-2025-32433](CVE-2025/CVE-2025-324xx/CVE-2025-32433.json) (`2025-06-10T01:00:02.087`)
- [CVE-2025-4318](CVE-2025/CVE-2025-43xx/CVE-2025-4318.json) (`2025-06-10T01:15:23.483`)
## Download and Usage ## Download and Usage

View File

@ -232396,7 +232396,7 @@ CVE-2023-39997,0,0,30a8b687bafab2083717c9daa4e43951f503741e66f546539c9f352ad4028
CVE-2023-39998,0,0,0aa1d87c7d15430aef5a56459adb004cd2be2550e9c553acb348a55d9d82b230,2025-01-31T14:22:08.727000 CVE-2023-39998,0,0,0aa1d87c7d15430aef5a56459adb004cd2be2550e9c553acb348a55d9d82b230,2025-01-31T14:22:08.727000
CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000 CVE-2023-39999,0,0,82b82212a0025fead4708054dd0afb247ed047894644e263dcde31faebf34331,2024-11-21T08:16:12.447000
CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000 CVE-2023-4000,0,0,39f91b713d4713b662aa8e3a2c23ad21a9a5b27c7f23cc18f70c42a560e4fe8b,2024-11-21T08:34:11.757000
CVE-2023-40000,0,0,2a1407722093a90e37ba5ec6b10ea074764f0585dc804d9b9fdab1824bce8663,2024-11-21T08:18:30.070000 CVE-2023-40000,0,1,b81f93c983b29fe639d04eed06fc4b450a11146b99040fc3073612832cae32cc,2025-06-10T01:12:58.563000
CVE-2023-40001,0,0,ccafe70163175ef0d8ce148a91e88d6b5fe2ed58d2617d4261cdcfaf2715f565,2024-12-13T15:15:20.870000 CVE-2023-40001,0,0,ccafe70163175ef0d8ce148a91e88d6b5fe2ed58d2617d4261cdcfaf2715f565,2024-12-13T15:15:20.870000
CVE-2023-40002,0,0,d628bd72e8db6227f7563b4fdade129622158c80a90b6ea31c7755104d7bc549,2024-11-21T08:18:30.170000 CVE-2023-40002,0,0,d628bd72e8db6227f7563b4fdade129622158c80a90b6ea31c7755104d7bc549,2024-11-21T08:18:30.170000
CVE-2023-40003,0,0,32013fef05f2fe1c148479ccd00a1acdff49d760fc8d6affd3a7ed938f7dd491,2025-02-05T14:28:12.657000 CVE-2023-40003,0,0,32013fef05f2fe1c148479ccd00a1acdff49d760fc8d6affd3a7ed938f7dd491,2025-02-05T14:28:12.657000
@ -249270,7 +249270,7 @@ CVE-2024-1521,0,0,b9e9b7158ea19eb6e0d034a7fbba1cb55281ba560e9c40fc45dc77953ecba6
CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000 CVE-2024-1522,0,0,9cdb2d31b60237752ef77325c4d109881b58042aa66e5c8934108a236d1a4daf,2024-11-21T08:50:45.060000
CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000 CVE-2024-1523,0,0,048eef54d080ea57df02f8070dee964acb62eadaded82c061ede59f9519607a2,2025-01-23T19:55:29.380000
CVE-2024-1525,0,0,c5719c2d073faeda894e23a5762be2b220de3339124866e59d0ff45c5692c966,2024-11-21T08:50:45.333000 CVE-2024-1525,0,0,c5719c2d073faeda894e23a5762be2b220de3339124866e59d0ff45c5692c966,2024-11-21T08:50:45.333000
CVE-2024-1526,0,0,071ecf3918efe80edacfbe601879f9356c96a5266b79b784b3049ab010075d7a,2025-03-20T20:15:30.910000 CVE-2024-1526,0,1,9925e60bac646ba4db690071c0513797a375618197f29bf844fbe3f8e94539be,2025-06-10T00:50:39.620000
CVE-2024-1527,0,0,5751429710d32c75a60ec4a9e982330410d061acf3fb1dcc13b89e3ee102fa3f,2025-02-26T15:38:35.823000 CVE-2024-1527,0,0,5751429710d32c75a60ec4a9e982330410d061acf3fb1dcc13b89e3ee102fa3f,2025-02-26T15:38:35.823000
CVE-2024-1528,0,0,f5fe7b2e6cfb357311ef59f2fa0ff32060f0bc6e50e568e1590dc784a7e328e5,2025-02-26T15:38:21.990000 CVE-2024-1528,0,0,f5fe7b2e6cfb357311ef59f2fa0ff32060f0bc6e50e568e1590dc784a7e328e5,2025-02-26T15:38:21.990000
CVE-2024-1529,0,0,e8bd623b4687f1fd281f2be84741e4de6fae302bf8f504711970b39f10ae43a3,2025-02-26T15:18:02.950000 CVE-2024-1529,0,0,e8bd623b4687f1fd281f2be84741e4de6fae302bf8f504711970b39f10ae43a3,2025-02-26T15:18:02.950000
@ -253193,7 +253193,7 @@ CVE-2024-24265,0,0,6e9c18a10ed665d0971c17b8d66c12683e1c03339bff964445be562bd85c0
CVE-2024-24266,0,0,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000 CVE-2024-24266,0,0,af02336efcfa0543c3e97f34d9dba916b482a01f48e05fd35bbfc898afb8622c,2025-06-05T19:15:27.480000
CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000 CVE-2024-24267,0,0,b362a573ae53d8b792a146f9eedf896751146ced822e7e1d5dd56d0a6c4993bf,2024-11-21T08:59:05.483000
CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000 CVE-2024-2427,0,0,1004d0a0def7c6cef3083eef72f06901103dddd8dc2669fb276e8dd287d1d79d,2025-01-31T15:41:57.463000
CVE-2024-24272,0,0,46ae69797319549d9edf794666b290a4d67db636dbf7faad557e08964c373ef7,2025-03-27T20:15:23.717000 CVE-2024-24272,0,1,c37469fadd1b04217b435dbc25f6292c671c3f3072f4f460970d1ceb54198e6d,2025-06-10T00:55:42.550000
CVE-2024-24275,0,0,3c8aa5e14da0cb646977d6dea2bbdcc1e8a016977bac5e3f5c10f87d01f6c88e,2025-03-27T21:15:45.937000 CVE-2024-24275,0,0,3c8aa5e14da0cb646977d6dea2bbdcc1e8a016977bac5e3f5c10f87d01f6c88e,2025-03-27T21:15:45.937000
CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909da4b,2025-03-27T21:15:46.123000 CVE-2024-24276,0,0,7bffcccdaa3ffe4fc240b27bb8a64ead8af378a61a210ff0bd0560962909da4b,2025-03-27T21:15:46.123000
CVE-2024-24278,0,0,3cbad9839e249836fd2db6ae47deedb03afcdc79c37d76090948905d5a88401f,2025-05-23T14:45:05.690000 CVE-2024-24278,0,0,3cbad9839e249836fd2db6ae47deedb03afcdc79c37d76090948905d5a88401f,2025-05-23T14:45:05.690000
@ -253843,7 +253843,7 @@ CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f0
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000 CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000 CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000 CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000
CVE-2024-25187,0,0,dc84ac70b7a834ca4d8817cfba89f5533dd0ade82e09a3247aa14cb146afc867,2024-11-21T09:00:24.440000 CVE-2024-25187,0,1,b5bdcba71ceb1efd4b7f3a75dfc46c9a93b6aa6414ead7bfb505e326018a4574,2025-06-10T00:46:34.737000
CVE-2024-25189,0,0,509ea081e277357b278ee949dac27256cde1e5cd64a689b5f46c4a4823913802,2024-11-21T09:00:24.657000 CVE-2024-25189,0,0,509ea081e277357b278ee949dac27256cde1e5cd64a689b5f46c4a4823913802,2024-11-21T09:00:24.657000
CVE-2024-2519,0,0,25506805cec23f34da1bcf6347cfcf15afa6fdde406c956fdefd44554556e9ce,2025-02-14T16:59:14.683000 CVE-2024-2519,0,0,25506805cec23f34da1bcf6347cfcf15afa6fdde406c956fdefd44554556e9ce,2025-02-14T16:59:14.683000
CVE-2024-25190,0,0,b1ba4d33a756c63f1888b43396a47998407e09c652481bc438cf266fbee6871e,2024-11-21T09:00:24.893000 CVE-2024-25190,0,0,b1ba4d33a756c63f1888b43396a47998407e09c652481bc438cf266fbee6871e,2024-11-21T09:00:24.893000
@ -255593,7 +255593,7 @@ CVE-2024-27305,0,0,e12f3c61dd0cffc99acfa36652f57b0b6eeecc0c2f6472e94e57f7ef61b87
CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000 CVE-2024-27306,0,0,7a28ab142666bcaf42530dd089da65a8aca11e816370cd89a9870260ca5d05b6,2024-11-21T09:04:17.527000
CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000 CVE-2024-27307,0,0,cf618de8ec42069f47b1c5022714176e378177129a4fe94cef62bc4f79ac235a,2024-11-21T09:04:17.667000
CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000 CVE-2024-27308,0,0,37f214bdd3eae19c6ca746aa11f3f3b092a842a3922749c87981b4f4a93b4ee5,2024-11-21T09:04:17.800000
CVE-2024-27309,0,0,570c97a789fd13ad0b10fc55182811a30969fc7ac7f41d6a0269deb68c312af1,2025-02-13T18:17:28.160000 CVE-2024-27309,0,1,6271d6ec0914264bb86483a74a4b3fdc9c4d92f0fc76e869075fe05585b0fa0c,2025-06-10T00:59:50.953000
CVE-2024-2731,0,0,f36a4a3bfea742e45f44c0d5df175483b69ed20da7cae25a4955506b87b8aba4,2024-11-21T09:10:23.687000 CVE-2024-2731,0,0,f36a4a3bfea742e45f44c0d5df175483b69ed20da7cae25a4955506b87b8aba4,2024-11-21T09:10:23.687000
CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000 CVE-2024-27310,0,0,0ee79b9bdb29212875d7f1e2706f2d2e430a7262b7fdafe9e2d4a8e95bde10da,2024-11-27T16:25:10.307000
CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6aff4,2024-11-21T09:04:18.287000 CVE-2024-27311,0,0,0c755bcc622ed9c321ec0b34f3a1b0b3952780668adba0a01799036912b6aff4,2024-11-21T09:04:18.287000
@ -256452,7 +256452,7 @@ CVE-2024-28446,0,0,130fe6f11acb7921804657dac29074c2a724a37c0f7026ddccf60719c6661
CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000 CVE-2024-28447,0,0,96f74453ed1c3ab881a5353933e4fe8cdaefba2a1eb3251d1371e6f2bfd54cd7,2024-11-21T09:06:23.603000
CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000 CVE-2024-2845,0,0,80105c9d9b479536e543f6f21c5940bb1e70afb1eb269649ceef66615a154207,2024-11-21T09:10:39.807000
CVE-2024-28456,0,0,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000 CVE-2024-28456,0,0,ad91c18de021a8979ada1ac9be6d1ef0a012ed4dac545d0eff1ea9a48f1067db,2025-03-27T20:15:25.390000
CVE-2024-28458,0,0,f0a88bd4e0af743dcf93dc794cdbbff9507aa57dc92b0582648ff8a3cda4c2d2,2024-11-21T09:06:24.153000 CVE-2024-28458,0,1,d089e0961a07e124018e8d1f556d32c3ead9fdaff86fbfb737b29b7b2926cfd5,2025-06-10T01:01:30.743000
CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000 CVE-2024-2846,0,0,73546df08f61686e6ff129bb1ed27be8b2886976e7d37bdbc909044b09df10da,2024-11-21T09:10:39.930000
CVE-2024-2847,0,0,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000 CVE-2024-2847,0,0,071016739328742b92b352de5364c32b24bf8902a38c2e6f36bcce22b371719e,2025-03-24T13:28:51.537000
CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000 CVE-2024-2848,0,0,62f4db9349fd62ae0d92f0f5786ba69f9c846f07a3e4b71b03d1f2958f128eec,2024-11-21T09:10:40.180000
@ -256553,7 +256553,7 @@ CVE-2024-28709,0,0,e561d43db0fcfedfba49cc4e0ad9b7df245718849f34cf15c2746fbbbd304
CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f55d,2025-02-07T19:34:58.843000 CVE-2024-2871,0,0,00a3f70b188d4cab7c8441ec548194239184a6bf2caa9d2c154a343ad4f6f55d,2025-02-07T19:34:58.843000
CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000 CVE-2024-28710,0,0,7ad2d331f1ff2a6c136748841c0166b43d4373b2229d7792bca3a0fa8b058dce,2025-03-25T17:15:53.377000
CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000 CVE-2024-28713,0,0,2660345ba02ff88ce3f8082cd6d8b2d36e81d83381b6e06b251f4d9ba4804eb1,2024-11-21T09:06:48.013000
CVE-2024-28714,0,0,457ce115a45e3373db362f2c5cad735326647eda50a6c6a00a6972e9dd495beb,2024-11-21T09:06:48.243000 CVE-2024-28714,0,1,2016e8accbb7084f74d0c24ce4b81c6735174694ae204335fd0b22c9533ecf84,2025-06-10T00:54:10.907000
CVE-2024-28715,0,0,d9472ea6a43c015dd517a111759ac118e36738fa957d5cf07fc0beb9d6a287d7,2024-11-21T09:06:48.480000 CVE-2024-28715,0,0,d9472ea6a43c015dd517a111759ac118e36738fa957d5cf07fc0beb9d6a287d7,2024-11-21T09:06:48.480000
CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000 CVE-2024-28716,0,0,3dcaba8e53d55236594341cc0c05e3a01de74966176d9fe2a191736842553636,2024-11-21T09:06:48.700000
CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000 CVE-2024-28717,0,0,f064c2527027f1d200a3ae2380ea6a1de60fc691a685db676c60e122a78221c4,2024-11-21T09:06:48.930000
@ -256587,7 +256587,7 @@ CVE-2024-28751,0,0,ceaed3272b135a4722d7745acb0bc62f516b0fe247956e66de3108e0ddf15
CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65acb8,2025-02-13T18:17:48.857000 CVE-2024-28752,0,0,3743867d820cb3fac6cc93d0ae0ebb1af1934f8628bb7b6539e88268ce65acb8,2025-02-13T18:17:48.857000
CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000 CVE-2024-28753,0,0,bf7e9c161fe17ddef885af4de9deb82e14e1947648f4df3c13214108525d2ba1,2025-05-01T00:17:11.497000
CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000 CVE-2024-28754,0,0,2214144a78c46b2580bfbfec179b899b282fb753a98595a9fdf69833f99d7b2c,2025-05-01T00:13:29.087000
CVE-2024-28755,0,0,163c8c2cf8da1f76adb3923ec4d582428a1d613293b4d594d252564f3eeef50a,2024-11-21T09:06:54.030000 CVE-2024-28755,0,1,94db876d89381c6bafbe99b1b5cd635119fcf3d8444f7aa68a6413cada173fe6,2025-06-10T00:41:15.783000
CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a62792634596a,2024-11-21T09:06:54.270000 CVE-2024-28756,0,0,690c3487a07876dd049c19665e845da2f28dadbd04cc6a33595a62792634596a,2024-11-21T09:06:54.270000
CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000 CVE-2024-28757,0,0,81da43f42617b41a14b128c7de9bea07265204ff81eb0bea8f4158090d852760,2025-03-28T19:15:21.230000
CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000 CVE-2024-28759,0,0,0a4255815bf43753569b9bf94f2fbddf12d43389c8cf8017f7885f21185e8276,2025-03-28T20:15:21.890000
@ -258203,7 +258203,7 @@ CVE-2024-30735,0,0,753441d7803dcc475ebaf2cfa2a11fe542629a9d58de825feb7b68625b124
CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015abda,2024-05-27T01:15:20.203000 CVE-2024-30736,0,0,2ced33d674490f24caa86d9cd5af28449006fe8e43616ef44cf265003015abda,2024-05-27T01:15:20.203000
CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000 CVE-2024-30737,0,0,061625de72d7496c66f4433249e7e460e27160d9df381544095455b128a43032,2024-05-27T01:15:20.303000
CVE-2024-3074,0,0,3994c2cc8b929115537999419e9e3fcc4366d9ad5b592787d0ddf7bba23509f6,2024-11-21T09:28:50.367000 CVE-2024-3074,0,0,3994c2cc8b929115537999419e9e3fcc4366d9ad5b592787d0ddf7bba23509f6,2024-11-21T09:28:50.367000
CVE-2024-3075,0,0,bcefb8f1520e4ccbad4feaa2ef3504905e1eb621afb9483e15b0eb03a2e859c6,2025-03-27T15:15:53.037000 CVE-2024-3075,0,1,79e774c47eb18851562c97832d067dddf9a748a04470426bc1a3785e01ac544e,2025-06-10T01:23:11.353000
CVE-2024-3076,0,0,b1bccbf63a16fe85396c421bd8338b5453b7e47b5e19a26088ca344942b34be7,2024-11-21T09:28:50.613000 CVE-2024-3076,0,0,b1bccbf63a16fe85396c421bd8338b5453b7e47b5e19a26088ca344942b34be7,2024-11-21T09:28:50.613000
CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000 CVE-2024-3077,0,0,fcbdd34b10368896e2c3c22301b222fc061a71cd9d47f461bb0e75567c8c2976,2025-01-23T19:21:44.207000
CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000 CVE-2024-3078,0,0,f23febdf123fb1167e6d15c44d9f90ae5c695a87735eb2afb067ff82e8b10873,2025-05-07T16:29:10.603000
@ -258323,7 +258323,7 @@ CVE-2024-3101,0,0,b43a9a65b8dd96b574d88a97c97263dded7de7cc0c3f0a55bcbdc8a92c066a
CVE-2024-31010,0,0,0b7313de80070fac2f916c379350f99d1722550266fcd7ba61df1f5dcf1681fd,2025-04-04T16:31:46.253000 CVE-2024-31010,0,0,0b7313de80070fac2f916c379350f99d1722550266fcd7ba61df1f5dcf1681fd,2025-04-04T16:31:46.253000
CVE-2024-31011,0,0,24b6b4b4d911bb44d7c9f667d95c31c2327e63da8572762d344d3e3e7da6b6a9,2024-11-21T09:12:43.390000 CVE-2024-31011,0,0,24b6b4b4d911bb44d7c9f667d95c31c2327e63da8572762d344d3e3e7da6b6a9,2024-11-21T09:12:43.390000
CVE-2024-31012,0,0,d5ae84c7329c4f393c728c5d6d85bb69767e6e8081880813cb0948691be7d260,2025-04-04T15:50:24.237000 CVE-2024-31012,0,0,d5ae84c7329c4f393c728c5d6d85bb69767e6e8081880813cb0948691be7d260,2025-04-04T15:50:24.237000
CVE-2024-31013,0,0,01d61c602b8e92c3361daf4356e39b3ab9f29a666d0e5bc89ee8873e6fa392ba,2025-03-17T16:15:21.610000 CVE-2024-31013,0,1,c8b08beaa05aa5eafe964510521b6e1a3b6ffa974e1c46ebca30a5ea5eebf3ef,2025-06-10T01:04:27.800000
CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000 CVE-2024-3102,0,0,21789bb35ca485f7acde593041e201a50941c14df197110842a770f0c2af0902,2024-11-21T09:28:54.413000
CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000 CVE-2024-31022,0,0,fa5cfa9d6c969311b3ca6b9628703584da75e1c91aae7ef142d5c75f0c054419,2025-05-22T14:28:25.127000
CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000 CVE-2024-31025,0,0,65d7ab3959086e03b6d319a4283b4c427986c994cd6832b660245eeb10de9b88,2024-11-21T09:12:44.277000
@ -258333,10 +258333,10 @@ CVE-2024-31030,0,0,2db6cd87c60f7cba647aba4826c76d42ed0417061d17f5a5018404da807f4
CVE-2024-31031,0,0,a40df481a620a7d230484f07ff93a7a4fe0711a2410e3138fc89f889af0f1188,2024-11-21T09:12:44.903000 CVE-2024-31031,0,0,a40df481a620a7d230484f07ff93a7a4fe0711a2410e3138fc89f889af0f1188,2024-11-21T09:12:44.903000
CVE-2024-31032,0,0,e702405228d09553ece2bdc0352b8b45095427e9fa8e7955f679e55af20e2fcd,2024-11-21T09:12:45.123000 CVE-2024-31032,0,0,e702405228d09553ece2bdc0352b8b45095427e9fa8e7955f679e55af20e2fcd,2024-11-21T09:12:45.123000
CVE-2024-31033,0,0,0c9876f1f7699edaaf20bd486b2d0f4a44b9fca47defdf69e7e92d25a918fefb,2024-11-21T09:12:45.350000 CVE-2024-31033,0,0,0c9876f1f7699edaaf20bd486b2d0f4a44b9fca47defdf69e7e92d25a918fefb,2024-11-21T09:12:45.350000
CVE-2024-31036,0,0,320a51acab827b5d37020b83564dfffd9aca98638cefa3812e1bd2ea9696700a,2024-11-21T09:12:45.570000 CVE-2024-31036,0,1,9db90a521957d495bc1ad6aad2637c8bbbfa08dc186eb4535e399179e99c009d,2025-06-10T01:30:34.650000
CVE-2024-3104,0,0,9bfd1c8aa5b4e014e62890c50cd4cea704588702c7ca86175d35f3b244f64537,2024-11-21T09:28:54.563000 CVE-2024-3104,0,0,9bfd1c8aa5b4e014e62890c50cd4cea704588702c7ca86175d35f3b244f64537,2024-11-21T09:28:54.563000
CVE-2024-31040,0,0,6ba23bdacaedfa612d50a99761a699fec9ed7d54aeccae1ec2a3d9166ef093d8,2024-11-21T09:12:45.783000 CVE-2024-31040,0,1,1a2c235a6f44cc46eddf090afea207111fd019edd2f8ef967cabb72b2615c80e,2025-06-10T01:38:19.090000
CVE-2024-31041,0,0,b75059e0a7695edaebc103078218ee6b58e5dbb076a591dc445c471bb0852293,2024-11-21T09:12:45.993000 CVE-2024-31041,0,1,4ffaeb2517870e7822b55fdc3ec9c5343447ff1d513d0eca0aa6d5b854f90a9e,2025-06-10T01:35:36.873000
CVE-2024-31047,0,0,72dbb8970f9822abc0ce34482f5428d56b2ed11de070e20d26d991147ce9c9fe,2024-11-21T09:12:46.207000 CVE-2024-31047,0,0,72dbb8970f9822abc0ce34482f5428d56b2ed11de070e20d26d991147ce9c9fe,2024-11-21T09:12:46.207000
CVE-2024-3105,0,0,84feae1bbc69233e3efa769dd357754a7d54983a559abad6a239194aa6dbc066,2024-11-21T09:28:54.717000 CVE-2024-3105,0,0,84feae1bbc69233e3efa769dd357754a7d54983a559abad6a239194aa6dbc066,2024-11-21T09:28:54.717000
CVE-2024-31061,0,0,8b79c6b582e94a5772b403ef365a2568a08e1a521fb33c0f0446400b2cd799d3,2025-04-03T15:09:53.590000 CVE-2024-31061,0,0,8b79c6b582e94a5772b403ef365a2568a08e1a521fb33c0f0446400b2cd799d3,2025-04-03T15:09:53.590000
@ -258814,7 +258814,7 @@ CVE-2024-3158,0,0,64ba1d8f16765085f53ed9bc04ebfd9e3747ac661f2c36e1e05c9b39e1f126
CVE-2024-31580,0,0,edde7918add3c016a5d1a89364b3c85df232b957b4de682b61bed612a4074f41,2025-03-29T00:15:21.733000 CVE-2024-31580,0,0,edde7918add3c016a5d1a89364b3c85df232b957b4de682b61bed612a4074f41,2025-03-29T00:15:21.733000
CVE-2024-31581,0,0,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45bb1,2025-06-03T15:30:44.147000 CVE-2024-31581,0,0,26f0b24afcce49599eab006e4dd0f04d587c422933e6a771f6252572dbc45bb1,2025-06-03T15:30:44.147000
CVE-2024-31582,0,0,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000 CVE-2024-31582,0,0,99d23ed94eadae550f3d5e4c7af4b99a2ab1c155adf84f6b0b2f2ac44026309e,2025-06-03T15:42:14.187000
CVE-2024-31583,0,0,f1ca2f57a4fb9ac891f614bcec1b1782e644a75286acabe19e0169b0f358659a,2024-11-21T09:13:43.540000 CVE-2024-31583,0,1,1d576dd3b933c7522919c517b06d1ad1b517de1d12fdfb1240e571027186192e,2025-06-10T01:33:43.180000
CVE-2024-31584,0,0,420fc644c705856ba8dd98ddb90300aaa523243bcaf8db7ce5ea0fd2d33809c9,2025-06-03T14:04:04.327000 CVE-2024-31584,0,0,420fc644c705856ba8dd98ddb90300aaa523243bcaf8db7ce5ea0fd2d33809c9,2025-06-03T14:04:04.327000
CVE-2024-31585,0,0,c3b782f97e2c9184cdf5a1bdf306b5395c037aafeff6c2ffaeb4ab22a9db35e6,2025-06-09T16:15:34.637000 CVE-2024-31585,0,0,c3b782f97e2c9184cdf5a1bdf306b5395c037aafeff6c2ffaeb4ab22a9db35e6,2025-06-09T16:15:34.637000
CVE-2024-31586,0,0,5efc79e21fbd8ed4e63282b64efbd5820d7cef26890f5053c7ad3f1ac2b5e4c1,2025-04-11T15:15:56.880000 CVE-2024-31586,0,0,5efc79e21fbd8ed4e63282b64efbd5820d7cef26890f5053c7ad3f1ac2b5e4c1,2025-04-11T15:15:56.880000
@ -258879,7 +258879,7 @@ CVE-2024-31744,0,0,83351da41e2f0f78c478d134c6a6a32ac303a7f74c88c74911c725e1530b5
CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000 CVE-2024-31745,0,0,1d2bc6dbb22666ca6fd7636d86e091f5aeff674e8f5352a220c9cbb705a7eb7c,2024-04-25T16:15:11.227000
CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000 CVE-2024-31747,0,0,1ff83f224bdbf8af1f9f4bcb86a91e1f678c13094ae1a77fdf1fd657baea901e,2024-11-21T09:13:50.523000
CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000 CVE-2024-3175,0,0,5f6302a6462e73c7261678b54271c3937e1258b7b4f3007957ea22e83fdb94e8,2024-11-21T09:29:04.757000
CVE-2024-31750,0,0,ebc9cb1e3513b20141faf6cc056c1c0b45ffe30f8c3ff897fd2fe4195d0a3bf7,2024-11-21T09:13:50.730000 CVE-2024-31750,0,1,f96eb8e3bbed78e55e09766d655b63a754ae5a7049972e728e16ce77deb482bc,2025-06-10T01:32:26.340000
CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000 CVE-2024-31755,0,0,71bb3aeb22181c517b85e9c0b60741c7bd35507479d56fe5a7b173dda191453a,2024-11-21T09:13:50.943000
CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000 CVE-2024-31756,0,0,0934d41af4d2a8096bf6b79ceb165d1d21a8cb15b32982d5c5355673185c396f,2024-11-21T09:13:51.160000
CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000 CVE-2024-31757,0,0,827ecdaa9dc7f88a37dfd8f4c09903a5f5a9992b64bc40c5e964ac858799f717,2024-11-21T09:13:51.390000
@ -258890,8 +258890,8 @@ CVE-2024-3177,0,0,5bf72b0bc06971896d316946ec2a45f35a4b8a5d69e19bb6025aca04738c4b
CVE-2024-31771,0,0,8e057a4c7ee5341cf741c545c5de0c42c8357074d8177829bdceb15ae04f34a8,2024-11-21T09:13:52.057000 CVE-2024-31771,0,0,8e057a4c7ee5341cf741c545c5de0c42c8357074d8177829bdceb15ae04f34a8,2024-11-21T09:13:52.057000
CVE-2024-31777,0,0,7d39a926878da060c40fa51d8497d0b8588d217d8e3fe5862751b007c9080250,2024-11-21T09:13:52.283000 CVE-2024-31777,0,0,7d39a926878da060c40fa51d8497d0b8588d217d8e3fe5862751b007c9080250,2024-11-21T09:13:52.283000
CVE-2024-3178,0,0,bd9ccb3de86d5f400ed0d1b42c5f29b2c8a2c83bff134722290e4e42bbb62188,2024-12-16T19:02:56.037000 CVE-2024-3178,0,0,bd9ccb3de86d5f400ed0d1b42c5f29b2c8a2c83bff134722290e4e42bbb62188,2024-12-16T19:02:56.037000
CVE-2024-31783,0,0,1b8c49320678c1ccd1d27d607e7632b0acf98370bc4a8f789eb554104969f2b5,2025-03-13T16:15:19.433000 CVE-2024-31783,0,1,cf26cbb6b5e47baaf1a5dc46c2b12fd2babed7275c9e954d0a96d1ac4a82c21b,2025-06-10T01:19:10.013000
CVE-2024-31784,0,0,f1392842505b72c301eab8b24988106d79c5016d7e81170b70b5cc6eabe4391c,2024-11-21T09:13:52.640000 CVE-2024-31784,0,1,3a7a609ab5690a1c92f3502af1739158ff2ab69d349be0135b9c2c854a639233,2025-06-10T01:14:55.257000
CVE-2024-3179,0,0,9a56868d90ea74197493de115b9ccc37e34e21c0dcd5e812b7cdcf499135cd56,2024-12-16T19:03:45.313000 CVE-2024-3179,0,0,9a56868d90ea74197493de115b9ccc37e34e21c0dcd5e812b7cdcf499135cd56,2024-12-16T19:03:45.313000
CVE-2024-31798,0,0,6c775446367d3139431a8bed0f06dd67790f81a1b7aff5c3c1630353cd491833,2024-08-16T13:59:00.523000 CVE-2024-31798,0,0,6c775446367d3139431a8bed0f06dd67790f81a1b7aff5c3c1630353cd491833,2024-08-16T13:59:00.523000
CVE-2024-31799,0,0,f21a03b695d6a36e6ba51b291aa1aa934c4d6926891338e496632c5eaf8bf345,2024-08-16T18:35:10.927000 CVE-2024-31799,0,0,f21a03b695d6a36e6ba51b291aa1aa934c4d6926891338e496632c5eaf8bf345,2024-08-16T18:35:10.927000
@ -266843,7 +266843,7 @@ CVE-2024-42005,0,0,4b7a03a62388d79840f1dbc20489aec0bae7f52ed889bdc9e9f4ed295e447
CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000 CVE-2024-42006,0,0,757a5058e2b20a07332e18e1715746958f2fc29b54fe8104fb4e99ba507aa82a,2025-03-18T20:15:23.103000
CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000 CVE-2024-42007,0,0,18023dc0188646143bd9484c36c6b41c6281c494fdb0237aba0cd6dd52e9a082,2024-11-21T09:33:24.887000
CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000 CVE-2024-42008,0,0,de59590c5b8ea2dcb20a78d933da654dd773353d185cc7aa221b80b9d6c81d30,2025-03-13T16:15:21.240000
CVE-2024-42009,0,0,5077fcd4de8bde6c882fe8ba9cf1a676a407121133b47066804fdf951a128533,2025-03-13T16:15:21.467000 CVE-2024-42009,0,1,02c0fe508080971857c7db434c0f0da2e38c91601d9214f3de7a413be892a884,2025-06-10T01:00:02.087000
CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000 CVE-2024-4201,0,0,caa8de420bccc88e064fd619fe08f6837c80c46ab6ceb4db233139f54456b674,2024-11-21T09:42:22.800000
CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000 CVE-2024-42010,0,0,03e7dee0af7871a1319da5b152346d87a38864f6270cfec745878dfc136b3e64,2024-08-12T14:15:07.370000
CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000 CVE-2024-42011,0,0,266d3b924a10f9b724bb81458292feaa2d0436def0bdd21429b955b06ed88aca,2024-10-30T18:35:10.283000
@ -282405,6 +282405,8 @@ CVE-2025-0014,0,0,a85170c840192d156f38eccc61ca038d577c819700d88e03a6460a0a1d9fd8
CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000 CVE-2025-0015,0,0,321b388b66a6f24115764aad9373a5b4540cea827bc5f4a9ec4c99c3ab51602a,2025-02-03T16:15:33.770000
CVE-2025-0020,0,0,8efc8d475c4f7672b1cd3ece81996c8d2a7ea8db9fd912e796980b06afe174f9,2025-05-19T19:15:47.690000 CVE-2025-0020,0,0,8efc8d475c4f7672b1cd3ece81996c8d2a7ea8db9fd912e796980b06afe174f9,2025-05-19T19:15:47.690000
CVE-2025-0035,0,0,68fbfea31f364a9172515b704cdb26d45ebc6cad2856985d3329218ae77b3cf5,2025-05-13T19:35:18.080000 CVE-2025-0035,0,0,68fbfea31f364a9172515b704cdb26d45ebc6cad2856985d3329218ae77b3cf5,2025-05-13T19:35:18.080000
CVE-2025-0036,1,1,4622d895242474524300bf29581e972fd6b88949fc94bc4781252a482e371217,2025-06-10T00:15:21.197000
CVE-2025-0037,1,1,cc1dfde006ade30b52c8384bda8e2e9f8b9a5502ce2fb01803c3f24f8c09eb35,2025-06-10T00:15:22.103000
CVE-2025-0049,0,0,8566ff09b2bbb295e6a6510741945c10bdac42655494cd307530daa390a46ab3,2025-05-10T00:55:19.180000 CVE-2025-0049,0,0,8566ff09b2bbb295e6a6510741945c10bdac42655494cd307530daa390a46ab3,2025-05-10T00:55:19.180000
CVE-2025-0050,0,0,482b5ff7576183287db2c32c74da0d2abbf92554144e005c1fef00f71efefdf1,2025-04-08T19:15:46.877000 CVE-2025-0050,0,0,482b5ff7576183287db2c32c74da0d2abbf92554144e005c1fef00f71efefdf1,2025-04-08T19:15:46.877000
CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000 CVE-2025-0053,0,0,b8373307f8e7839c7035660b5035e0ad8594f9f834cb4c64706371a8c3a2ce31,2025-01-14T01:15:15.403000
@ -286350,6 +286352,7 @@ CVE-2025-23189,0,0,b372693675c5d6d50e215d8acb54007642608e3ca2a789b9ea116e268e1e2
CVE-2025-2319,0,0,250004f4f8ff7b8a3f1cf022fb649f67811f3943071000b1555d7ca7d27e7b29,2025-03-27T16:45:46.410000 CVE-2025-2319,0,0,250004f4f8ff7b8a3f1cf022fb649f67811f3943071000b1555d7ca7d27e7b29,2025-03-27T16:45:46.410000
CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000 CVE-2025-23190,0,0,87842373d301ca780cfdfed4b8137d271e812becd8d75ff110dd7b27091c3193,2025-02-11T01:15:10.413000
CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000 CVE-2025-23191,0,0,93bf39b052d32c7fd79bf315d4657bdb3b25800f484d8ee22918be2670f1ecea,2025-02-11T01:15:10.557000
CVE-2025-23192,1,1,48d1b3601799661a56ff8df20758502b2a832d87787b19305df14e4827422544,2025-06-10T01:15:20.847000
CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000 CVE-2025-23193,0,0,dd2b7306807ec40f9912fb49ee68934fd2efddf05fc31efb201a5ebd32befe04,2025-02-11T01:15:10.700000
CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619c35,2025-03-11T01:15:34.630000 CVE-2025-23194,0,0,2abdaa039bd60248a2d82f5999a9ed81ae8b9d9f0da1d221293e79525f619c35,2025-03-11T01:15:34.630000
CVE-2025-23195,0,0,f18609b9fc2e63f3f6cc26e297ac4523abaa4c7810065fbb0fe1b0f95fc74e97,2025-06-09T19:36:09.710000 CVE-2025-23195,0,0,f18609b9fc2e63f3f6cc26e297ac4523abaa4c7810065fbb0fe1b0f95fc74e97,2025-06-09T19:36:09.710000
@ -288636,7 +288639,7 @@ CVE-2025-2645,0,0,bb51f6ba23884b7e7c3767dcbb7ecf7badccba1b056823008f0ccc4a1f7f8f
CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000 CVE-2025-2646,0,0,1f43af586340e9a3b657344aff21032473ef2c407815ff224af302b07a3268d0,2025-04-02T12:32:58.283000
CVE-2025-26465,0,0,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000 CVE-2025-26465,0,0,ac0fdb720eaae016b7a47bcdeea42f0bc1abfe57712ef9fedbef53f01af96ede,2025-06-02T15:15:33.437000
CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000 CVE-2025-26466,0,0,1656a292c9a746d1d9c8576626629bb24a094bd9c889c8b628a2189f999ed909,2025-05-27T16:15:31.100000
CVE-2025-26468,1,1,163e88e66617a1b6bce0df5f891a40b8ea6ed555fd047a72d2856f022ca7328b,2025-06-09T23:15:21.753000 CVE-2025-26468,0,0,163e88e66617a1b6bce0df5f891a40b8ea6ed555fd047a72d2856f022ca7328b,2025-06-09T23:15:21.753000
CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000 CVE-2025-2647,0,0,31fe515a44f11cf9569f888e0a91d0a688196caf010a5ad274bf1696fe7f4f4e,2025-03-27T16:26:36.977000
CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000 CVE-2025-26473,0,0,41b0bd46f32c6729eefb29a2666cce546dde395dd2362800539aebed7d4bc19a,2025-03-19T10:34:55.550000
CVE-2025-26475,0,0,bb522c072ef93dfba48b372ed229d0225844c8b3a620822d85a725743264d063,2025-05-20T18:01:18.020000 CVE-2025-26475,0,0,bb522c072ef93dfba48b372ed229d0225844c8b3a620822d85a725743264d063,2025-05-20T18:01:18.020000
@ -290610,8 +290613,8 @@ CVE-2025-30176,0,0,c1bd2b7ffef5f0e4c660a189483015165b303f3c3712bfe313b02ec0266a1
CVE-2025-30177,0,0,dd6bcf9daefbb6e1a68c3d702c2bf7abf53ae7032efaf201b8e1a6842e388876,2025-04-15T13:00:12.587000 CVE-2025-30177,0,0,dd6bcf9daefbb6e1a68c3d702c2bf7abf53ae7032efaf201b8e1a6842e388876,2025-04-15T13:00:12.587000
CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000 CVE-2025-30179,0,0,e6188b5cfe41efd4be24afd0a9be97fe3cad7c2aaaf7dc5206b7ef410f616059,2025-03-27T14:45:47.520000
CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000 CVE-2025-3018,0,0,699e90ef59bc974dffc7069ff5404d401834f1962c8486f8c32f7bd651f7ed16,2025-04-07T14:35:25.290000
CVE-2025-30183,1,1,72c134920af7c21164e8b367c32a71916aa5d808c3a7f49279480d8a7b8aa8ea,2025-06-09T23:15:21.947000 CVE-2025-30183,0,0,72c134920af7c21164e8b367c32a71916aa5d808c3a7f49279480d8a7b8aa8ea,2025-06-09T23:15:21.947000
CVE-2025-30184,1,1,1dd5a24ae61ab9a0b9efe94150263e542def2dee94ec991dd8716e264e34ccc6,2025-06-09T22:15:21.440000 CVE-2025-30184,0,0,1dd5a24ae61ab9a0b9efe94150263e542def2dee94ec991dd8716e264e34ccc6,2025-06-09T22:15:21.440000
CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000 CVE-2025-3019,0,0,70e870259e621652f69977e8a6f5a1f65a77b053f491785fe2e80412bfee7fd9,2025-04-01T20:26:30.593000
CVE-2025-30193,0,0,b5631b7234d99d822f89477675795fc1e4557911370ff922aff47427c545178b,2025-05-21T20:25:16.407000 CVE-2025-30193,0,0,b5631b7234d99d822f89477675795fc1e4557911370ff922aff47427c545178b,2025-05-21T20:25:16.407000
CVE-2025-30194,0,0,30477cd5945bbe191bc812e7db4478e6b35f9fd4c4dfae67346b2f92b072ba8f,2025-04-29T14:15:32.390000 CVE-2025-30194,0,0,30477cd5945bbe191bc812e7db4478e6b35f9fd4c4dfae67346b2f92b072ba8f,2025-04-29T14:15:32.390000
@ -290836,13 +290839,13 @@ CVE-2025-30476,0,0,1b83fd85bea0d8069f29b8d374be29abf968282bb62616dfb04a4e47265c3
CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000 CVE-2025-3048,0,0,5eb6156d35bbaa6ace17e28077befe8dbbf8441f38642f57d7841d345fe9515f,2025-04-01T20:26:22.890000
CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000 CVE-2025-30485,0,0,f2856ee96c6d55a594aa71df88615bdd59c4c1a0f52dcb79297759def1147103,2025-04-07T14:18:34.453000
CVE-2025-3050,0,0,fc15ad23bd9afa2f65532303fa5ace006644959019c36eff80cd9adece20e167,2025-06-09T18:59:36.360000 CVE-2025-3050,0,0,fc15ad23bd9afa2f65532303fa5ace006644959019c36eff80cd9adece20e167,2025-06-09T18:59:36.360000
CVE-2025-30507,1,1,3ef30057326fd6dd90e5341a2543ac31f71160d25b7f96cd9934f503ced6fba4,2025-06-09T23:15:22.110000 CVE-2025-30507,0,0,3ef30057326fd6dd90e5341a2543ac31f71160d25b7f96cd9934f503ced6fba4,2025-06-09T23:15:22.110000
CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000 CVE-2025-3051,0,0,03f9e07d76193917b8de9d74f13ff070438d20cd42142f9b8ee6c497180d4b37,2025-04-01T20:26:11.547000
CVE-2025-30510,0,0,65385fbb77c3413b4dbd5af09bd8095b856fda193f49543e9bce544dff1a2627,2025-04-16T13:25:37.340000 CVE-2025-30510,0,0,65385fbb77c3413b4dbd5af09bd8095b856fda193f49543e9bce544dff1a2627,2025-04-16T13:25:37.340000
CVE-2025-30511,0,0,8563c461353588100bf079ab1328ff6e11ab2f047bd1165d78f20b19233b493f,2025-04-16T13:25:59.640000 CVE-2025-30511,0,0,8563c461353588100bf079ab1328ff6e11ab2f047bd1165d78f20b19233b493f,2025-04-16T13:25:59.640000
CVE-2025-30512,0,0,830ca9aa3d060fbfd3176f9d9f5c7cd3b5eb14a6890ffb225ca2f7e33b59a139,2025-04-16T13:25:37.340000 CVE-2025-30512,0,0,830ca9aa3d060fbfd3176f9d9f5c7cd3b5eb14a6890ffb225ca2f7e33b59a139,2025-04-16T13:25:37.340000
CVE-2025-30514,0,0,191fbbadf6252574a267c8157cf87ff8e05e4c53e45be9178ae9e940181c57b2,2025-04-16T13:25:59.640000 CVE-2025-30514,0,0,191fbbadf6252574a267c8157cf87ff8e05e4c53e45be9178ae9e940181c57b2,2025-04-16T13:25:59.640000
CVE-2025-30515,1,1,614960604329a0eaed1a817027e1b09f610d68c4507b5268d02b65ad0e798c79,2025-06-09T23:15:22.273000 CVE-2025-30515,0,0,614960604329a0eaed1a817027e1b09f610d68c4507b5268d02b65ad0e798c79,2025-06-09T23:15:22.273000
CVE-2025-30516,0,0,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000 CVE-2025-30516,0,0,6e9088ba36985b7325f51c1d3c78cbc79ac0a2c6c97bf904fbc9eebc8d7f06b9,2025-04-15T18:39:27.967000
CVE-2025-30520,0,0,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000 CVE-2025-30520,0,0,36202f4247a4e2c05ed8fe3c2794dc6deb26ec20b4118dea06db3314c5e3a395,2025-04-01T20:26:11.547000
CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000 CVE-2025-30521,0,0,eee2f839741a5e176cacf865cc6d42d2df432fd3f60c0ff1d8e1355c4ac5b964,2025-03-27T16:44:44.143000
@ -291537,6 +291540,7 @@ CVE-2025-3129,0,0,9ce9125356a6ba22d5c34f89147622c417a2440c2d1cce155406586438a1f6
CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea9232965364,2025-04-29T13:09:32.353000 CVE-2025-3130,0,0,3331839c90977481f0952c53c01c561e7ce3f9a4b6241dc2a679ea9232965364,2025-04-29T13:09:32.353000
CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000 CVE-2025-3131,0,0,22058460edb80eeb28e47627ce19a90708c04371cfdf5beafe6e1efa2f6db14c,2025-04-22T16:16:30.543000
CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000 CVE-2025-31324,0,0,f022551eb03f972b51d5adf3fa8b8bd88e48c383f69788d6260b2cb6e8237e8d,2025-05-06T20:59:33.773000
CVE-2025-31325,1,1,2fcbe8c8ed524c0d3bedf5d98bbb9ec2838bcfdc406ffc7886d324875a19ad66,2025-06-10T01:15:21.060000
CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000 CVE-2025-31327,0,0,32f90adc396c5de5b649e8fa5cbb5b70c97a786ce6ce173df87cdac30806552e,2025-04-23T14:08:13.383000
CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000 CVE-2025-31328,0,0,7562727b37bc696206e3437191848ea7fd9fb71483caff96e2687c6513ba8732,2025-04-23T14:08:13.383000
CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000 CVE-2025-31329,0,0,1fc101be6dd06c49bba529860427b1b9723c1206bb0b29e1d558e09c6f01e194,2025-05-13T19:35:25.503000
@ -292466,7 +292470,7 @@ CVE-2025-32428,0,0,32eeebbb9eb52efc2ed96bd05d1eccbda5203d0361f63bfcafb88d13c22b3
CVE-2025-3243,0,0,4b2bb05912dfa327561457ea9db9da3d0253e77015cecee72f471cd1253e6547,2025-05-28T21:10:35.537000 CVE-2025-3243,0,0,4b2bb05912dfa327561457ea9db9da3d0253e77015cecee72f471cd1253e6547,2025-05-28T21:10:35.537000
CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000 CVE-2025-32431,0,0,c841c5dc407677a5965f2a37065aa8f465f93e2d2ebac9e51959dc5b7aa3e0fc,2025-04-23T14:08:13.383000
CVE-2025-32432,0,0,431fc0fbedd754e521baa62824583ff2e21564f5b0b8bca365cd2f1af03e8472,2025-04-28T20:57:06.397000 CVE-2025-32432,0,0,431fc0fbedd754e521baa62824583ff2e21564f5b0b8bca365cd2f1af03e8472,2025-04-28T20:57:06.397000
CVE-2025-32433,0,0,eb03f4e830e2501a42be89d3762405d2579da6f00fe77868ee93e070f2059b4f,2025-04-25T23:15:16.993000 CVE-2025-32433,0,1,c5a9d28a1c91e6f5c5a104a336d9266257d0d414399621a278e42019174e4995,2025-06-10T01:00:02.087000
CVE-2025-32434,0,0,fdb96b52967a7fc43923938e661ad69461f69a5d08690c104a9b172e74ac945f,2025-05-28T13:14:20.750000 CVE-2025-32434,0,0,fdb96b52967a7fc43923938e661ad69461f69a5d08690c104a9b172e74ac945f,2025-05-28T13:14:20.750000
CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000 CVE-2025-32435,0,0,7ba8a8f054688926acb7f901f231a9b0d1f3c82a661a3919e86abb05ad5c7deb,2025-04-16T13:25:37.340000
CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000 CVE-2025-32438,0,0,296774c27c9f9d6fea06d7416f18b1b6b989b53f8f837fb0990eec395e66a9b8,2025-04-16T13:25:59.640000
@ -294484,9 +294488,23 @@ CVE-2025-4292,0,0,a1c46f024258686aac63cd7452c805b468fbd0c1f2665b5af0c4874925b38b
CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000 CVE-2025-42921,0,0,fe45c9bf48d8b64b0cac9604dcc1ad3071452dfd7112cafe12dd9c33c82af017,2025-04-23T15:25:30.927000
CVE-2025-4293,0,0,d2f8ae34d311c55ca81099f103bba1d0cd562fd8e7c014930d8105d9c6667b18,2025-05-07T14:13:35.980000 CVE-2025-4293,0,0,d2f8ae34d311c55ca81099f103bba1d0cd562fd8e7c014930d8105d9c6667b18,2025-05-07T14:13:35.980000
CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000 CVE-2025-4297,0,0,2125bd423cd8ee8185dc917035443ae13b98a933b8dab9e4e9a974e1b93ea733,2025-05-16T17:44:43.850000
CVE-2025-42977,1,1,1ac61219c38624ba547d8f7bec0b2d0820c42418cd44a366c65ce285f3850f0c,2025-06-10T01:15:21.220000
CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000 CVE-2025-4298,0,0,e54afc5cb294aa37ab5ddf7cb60307aaa6afeb78004ee588006228c0c5b744b4,2025-05-13T20:06:19.080000
CVE-2025-42982,1,1,88cd99a487e3936fb062a772b03dc1d495eafb1afca32a9714a4fd60b53375ab,2025-06-10T01:15:21.383000
CVE-2025-42983,1,1,907df10d19a0af4eaf40735ec8049c00a4f446b2ae026d7ba098776318a9bcd2,2025-06-10T01:15:21.537000
CVE-2025-42984,1,1,049e4bfe682fa2a19ffcda7fe869019e9238ed2e207743d7c69f71dd7a9c70fc,2025-06-10T01:15:21.703000
CVE-2025-42987,1,1,f7224850f4dedc8582d139088576015f05cbbc53eae851ac4a59aa2f7a32ae32,2025-06-10T01:15:21.860000
CVE-2025-42988,1,1,d7b5768857963eb5b7ba389b0f5947eb3dfff3e17e8871d1b831cc55e6d62bb4,2025-06-10T01:15:22.023000
CVE-2025-42989,1,1,07a9c7beea7670d52713696588e0e3a8171ff6f98af685732020f5721b2d4a0c,2025-06-10T01:15:22.183000
CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000 CVE-2025-4299,0,0,cc4a3e24204515aaf4850521a61cefe5731008dd8b97ebba472ff5c5a801f5ca,2025-05-13T20:06:00.377000
CVE-2025-42990,1,1,7c7d9d4e991146fc95980197917d70d4d49def267d6e4b3af1e080c063e982e9,2025-06-10T01:15:22.340000
CVE-2025-42991,1,1,5d94db5e74f196325e7b7a1f6689dd7055b1046bc26eb28c59f56baebad13632,2025-06-10T01:15:22.507000
CVE-2025-42993,1,1,66b41379931324b0dba728ff9055984d96dd46cd718ea1d6777b3501762f85df,2025-06-10T01:15:22.667000
CVE-2025-42994,1,1,1acda648db7bed6c0c5c5cbf4540585a56bb09e264c920528bfa3080f7df8d4e,2025-06-10T01:15:22.823000
CVE-2025-42995,1,1,02b8fe825e71fa8ad5db974a18f13c02f228fdb95891aff57916b904646eaa4f,2025-06-10T01:15:22.980000
CVE-2025-42996,1,1,dfa0ccb2d1f1fdba36694a37bbad5d2819869c78df12386f9597666d5fb730ba,2025-06-10T01:15:23.143000
CVE-2025-42997,0,0,0db878c2cfc8ff1365eb2be4d72f29ef4ec6fbd53f1d04e9ce03d23507611246,2025-05-13T19:35:25.503000 CVE-2025-42997,0,0,0db878c2cfc8ff1365eb2be4d72f29ef4ec6fbd53f1d04e9ce03d23507611246,2025-05-13T19:35:25.503000
CVE-2025-42998,1,1,b8fecffd9fe778519940687ede9d00858d726db9a1b595ceebef0602ef0da68e,2025-06-10T01:15:23.307000
CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000 CVE-2025-42999,0,0,a0a9942912bd021b739fb32ce123af4bb7497f07493d1c056f2a75451f04f20d,2025-05-16T19:44:49.400000
CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000 CVE-2025-4300,0,0,f7c03ed92744380706d903a9f694588f32e405152084eae0fc0569337f5db7ce,2025-05-13T20:22:08.717000
CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000 CVE-2025-43000,0,0,e31fc74811b3e3770c864cd0f324b9ae9ae79a3c82cdc5b33a35261048a81925,2025-05-13T19:35:25.503000
@ -294521,7 +294539,7 @@ CVE-2025-4313,0,0,96adfe49118b3dc0ffa2d766514becfcea2a2e173aec97c2971381d69b1c7c
CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e0a,2025-05-14T20:57:14.900000 CVE-2025-4314,0,0,89cfceef9bbe0699f164e05975fe9dcf3155dc1437b8d0bc5f6540ae67e31e0a,2025-05-14T20:57:14.900000
CVE-2025-4316,0,0,a3cffae4e2b5f53f1a661b0b9d82da9e0409120ddd80fb5f02808f802009be7c,2025-05-14T13:15:48.907000 CVE-2025-4316,0,0,a3cffae4e2b5f53f1a661b0b9d82da9e0409120ddd80fb5f02808f802009be7c,2025-05-14T13:15:48.907000
CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000 CVE-2025-4317,0,0,f983c055783da6de4e51f0e6cd7b6401724e0ab142e6ae06607742ab65cbbc38,2025-05-13T19:35:18.080000
CVE-2025-4318,0,0,73cdf24936a82810c3179f2491c41f7aa46df0277cfdc5785e8661e453babeab,2025-05-05T20:54:19.760000 CVE-2025-4318,0,1,5887b3ce06385074832e5ab93ef36220685a1c2570be13ee561ec8804f3cb15a,2025-06-10T01:15:23.483000
CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000 CVE-2025-4322,0,0,e2ee1e5545786d5194d1f34f3de88e5515751a08a7c9f4ad7a4ef29aeb6cb910,2025-05-21T20:25:16.407000
CVE-2025-4323,0,0,a92a49c291d6e9dc74ae26b690a6171ab8ae00628949ef68fbb0006bd7671b31,2025-05-07T14:13:35.980000 CVE-2025-4323,0,0,a92a49c291d6e9dc74ae26b690a6171ab8ae00628949ef68fbb0006bd7671b31,2025-05-07T14:13:35.980000
CVE-2025-4324,0,0,58fa7de6e56ad865b5257250bcee13b8e1686fe64bd3ad7adcfbc671861c19e1,2025-05-07T14:13:35.980000 CVE-2025-4324,0,0,58fa7de6e56ad865b5257250bcee13b8e1686fe64bd3ad7adcfbc671861c19e1,2025-05-07T14:13:35.980000
@ -296401,7 +296419,7 @@ CVE-2025-49137,0,0,4a9bc70d2fa871bf4605433ea43fb5042c491536b67aeba8f2381a10a42a4
CVE-2025-49138,0,0,afec9b8853bb09177fbd685c5c96dfab6c791e5562e74f32f9c30e5ddd13eaf3,2025-06-09T21:15:47.047000 CVE-2025-49138,0,0,afec9b8853bb09177fbd685c5c96dfab6c791e5562e74f32f9c30e5ddd13eaf3,2025-06-09T21:15:47.047000
CVE-2025-49139,0,0,298d2b55fe3f58702c8a8336073404abfb72895885d946c55a5eec2f31d44687,2025-06-09T21:15:47.203000 CVE-2025-49139,0,0,298d2b55fe3f58702c8a8336073404abfb72895885d946c55a5eec2f31d44687,2025-06-09T21:15:47.203000
CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000 CVE-2025-4914,0,0,a988b116f09ba2a954362a47d883dbc77032cfbf0fc2d8366f3812d4ec746e85,2025-05-19T17:37:31.327000
CVE-2025-49140,1,1,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c97d,2025-06-09T22:15:22.153000 CVE-2025-49140,0,0,41fcec6243aa5d7f5df8648df8084e34894ac7ed31a6ee04e5726a36fd81c97d,2025-06-09T22:15:22.153000
CVE-2025-49141,0,0,de0e15852e3a7a9695ab23fa0f5963a9591d4cd2c49227521c6a4df241d53639,2025-06-09T21:15:47.360000 CVE-2025-49141,0,0,de0e15852e3a7a9695ab23fa0f5963a9591d4cd2c49227521c6a4df241d53639,2025-06-09T21:15:47.360000
CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000 CVE-2025-4915,0,0,46c7fa6aa65dcb339a70ae5c3381e0e409573ebed627552c1d75e88ea8911815,2025-05-19T17:37:39.277000
CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000 CVE-2025-4916,0,0,f4f666575ba307bca9e4be1cb48057a5262f7335ea23c5ca4141ce76f034cc3f,2025-05-19T17:37:50.063000
@ -297176,11 +297194,17 @@ CVE-2025-5894,0,0,654242cace97981f86dd5829ceaa9ac008f0c3374b73eef1c99cc2c32cf2e6
CVE-2025-5895,0,0,c6e4185df93ec71c290d1297e23624cb6c7281ee8d109da1434f874f78f613b2,2025-06-09T20:15:25.890000 CVE-2025-5895,0,0,c6e4185df93ec71c290d1297e23624cb6c7281ee8d109da1434f874f78f613b2,2025-06-09T20:15:25.890000
CVE-2025-5896,0,0,60e8b583acf869ca7196943fa8b43ab76054382ca45e05f2e85ddaeb58922466,2025-06-09T21:15:47.517000 CVE-2025-5896,0,0,60e8b583acf869ca7196943fa8b43ab76054382ca45e05f2e85ddaeb58922466,2025-06-09T21:15:47.517000
CVE-2025-5897,0,0,6ba518894d0e57a77d37b1420811a6c6aed816ec1e63b75c7cfbf61d80aa051f,2025-06-09T21:15:47.707000 CVE-2025-5897,0,0,6ba518894d0e57a77d37b1420811a6c6aed816ec1e63b75c7cfbf61d80aa051f,2025-06-09T21:15:47.707000
CVE-2025-5898,1,1,cce039980166689a3acddc08d6acf70174a79615ac9d44ba32eeb021665ac413,2025-06-09T22:15:22.327000 CVE-2025-5898,0,0,cce039980166689a3acddc08d6acf70174a79615ac9d44ba32eeb021665ac413,2025-06-09T22:15:22.327000
CVE-2025-5899,1,1,6fc7e077ed900ce38ad161acad8813d50033b2c9b5fa8abbaa53775be2e7228c,2025-06-09T22:15:22.557000 CVE-2025-5899,0,0,6fc7e077ed900ce38ad161acad8813d50033b2c9b5fa8abbaa53775be2e7228c,2025-06-09T22:15:22.557000
CVE-2025-5900,1,1,930444d7eeb3b1ddd8b8ac3981a77be2d0faef64341ce026a26222e796099745,2025-06-09T22:15:22.790000 CVE-2025-5900,0,0,930444d7eeb3b1ddd8b8ac3981a77be2d0faef64341ce026a26222e796099745,2025-06-09T22:15:22.790000
CVE-2025-5901,1,1,82dbf68b7853fd88172f4ff0ab8f21b89e4d8a17877df01445ce4727961959d0,2025-06-09T23:15:22.433000 CVE-2025-5901,0,0,82dbf68b7853fd88172f4ff0ab8f21b89e4d8a17877df01445ce4727961959d0,2025-06-09T23:15:22.433000
CVE-2025-5902,1,1,9babf0453954c075cf5597a7430a1c71b03244df31f2828e4e3b0b0c3cc0dc9b,2025-06-09T23:15:22.617000 CVE-2025-5902,0,0,9babf0453954c075cf5597a7430a1c71b03244df31f2828e4e3b0b0c3cc0dc9b,2025-06-09T23:15:22.617000
CVE-2025-5903,1,1,f0e66e1274fe9208f52179ff8e87a1b9dffe6bdbd486c2e3eb77086bd9a74b46,2025-06-10T00:15:22.243000
CVE-2025-5904,1,1,32aad757bab1a3ced172091134f849188d9b452ade8ed80bcf453849be87415c,2025-06-10T00:15:22.453000
CVE-2025-5905,1,1,4640c69ee55ba9dd6382404c2da278693c59fedc07931752dc25ae9a7fc40a6d,2025-06-10T00:15:22.653000
CVE-2025-5906,1,1,aa989b7dcccb5c034fc1eea8eff37f01bc4327bb2f6ad2c0f749ad5ccfddb4ac,2025-06-10T01:15:23.720000
CVE-2025-5907,1,1,5d329676c8670997ed9bbd9ec920c44010fa9710ac335febffe90162e564e157,2025-06-10T01:15:23.963000
CVE-2025-5908,1,1,37a781f179b1660861001bee4d6c7fb2b67dae046e6af7975b6ededfbac21b41,2025-06-10T01:15:24.167000
CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000 CVE-2025-5914,0,0,ca2950efdb51e21bbb1b52a25d765df8575e0ffa29446d96c03c3ef2bb78c27f,2025-06-09T20:15:26.123000
CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000 CVE-2025-5915,0,0,0e67ccac333c7a11c03869b01cbfabaf1cb283cb5a64338a4f2ca5aab164415e,2025-06-09T20:15:26.317000
CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000 CVE-2025-5916,0,0,de33dac47619c4e1d912727e7eb0e9fccd9c7c67167013ac3aa335bd776c0a9e,2025-06-09T20:15:27.170000

Can't render this file because it is too large.