Auto-Update: 2025-06-19T18:00:19.544499+00:00

This commit is contained in:
cad-safe-bot 2025-06-19 18:03:58 +00:00
parent 5386f51c9c
commit 47d2332c51
7 changed files with 501 additions and 22 deletions

View File

@ -0,0 +1,16 @@
{
"id": "CVE-2006-2192",
"sourceIdentifier": "security@debian.org",
"published": "2025-06-19T16:15:21.717",
"lastModified": "2025-06-19T16:15:21.717",
"vulnStatus": "Rejected",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
}
],
"metrics": {},
"references": []
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-50200",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-19T17:15:26.123",
"lastModified": "2025-06-19T17:15:26.123",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "RabbitMQ is a messaging and streaming broker. In versions 3.13.7 and prior, RabbitMQ is logging authorization headers in plaintext encoded in base64. When querying RabbitMQ api with HTTP/s with basic authentication it creates logs with all headers in request, including authorization headers which show base64 encoded username:password. This is easy to decode and afterwards could be used to obtain control to the system depending on credentials. This issue has been patched in version 4.0.8."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-532"
}
]
}
],
"references": [
{
"url": "https://github.com/rabbitmq/rabbitmq-server/security/advisories/GHSA-gh3x-4x42-fvq8",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,94 @@
{
"id": "CVE-2025-52464",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-06-19T16:15:22.327",
"lastModified": "2025-06-19T16:15:22.327",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Meshtastic is an open source mesh networking solution. In versions from 2.5.0 to before 2.6.11, the flashing procedure of several hardware vendors was resulting in duplicated public/private keys. Additionally, the Meshtastic was failing to properly initialize the internal randomness pool on some platforms, leading to possible low-entropy key generation. When users with an affected key pair sent Direct Messages, those message could be captured and decrypted by an attacker that has compiled the list of compromised keys. This issue has been patched in version 2.6.11 where key generation is delayed til the first time the LoRa region is set, along with warning users when a compromised key is detected. Version 2.6.12 furthers this patch by automatically wiping known compromised keys when found. A workaround to this vulnerability involves users doing a complete device wipe to remove vendor-cloned keys."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:L/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-331"
}
]
}
],
"references": [
{
"url": "https://github.com/meshtastic/firmware/commit/4bf2dd04aeeccc4ba20c79bcaad7a572aabdecad",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/meshtastic/firmware/commit/55b2bbf93756fc7bbbfdbc7cbf29f88e6b637f22",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/meshtastic/firmware/commit/e5f6804421ac4b76dd31980250a505dba24c2aa6",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/meshtastic/firmware/commit/e623c70bd0c2ab9db9baf04888e19d1428310bb9",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/meshtastic/firmware/security/advisories/GHSA-gq7v-jr8c-mfr7",
"source": "security-advisories@github.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6269",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-19T16:15:22.797",
"lastModified": "2025-06-19T16:15:22.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in HDF5 up to 1.14.6. Affected by this vulnerability is the function H5C__reconstruct_cache_entry of the file H5Cimage.c. The manipulation leads to heap-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/HDFGroup/hdf5/issues/5579",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/20626503/reproduce.tar.gz",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313273",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313273",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592587",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6270",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-19T17:15:27.167",
"lastModified": "2025-06-19T17:15:27.167",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in HDF5 up to 1.14.6. Affected by this issue is the function H5FS__sect_find_node of the file H5FSsection.c. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 1.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 4.3,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 3.1,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://github.com/HDFGroup/hdf5/issues/5580",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/user-attachments/files/20626642/reproduce.tar.gz",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313274",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313274",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.592588",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-19T16:00:20.308673+00:00
2025-06-19T18:00:19.544499+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-19T15:15:20.810000+00:00
2025-06-19T17:15:27.167000+00:00
```
### Last Data Feed Release
@ -33,28 +33,24 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
298709
298714
```
### CVEs added in the last Commit
Recently added CVEs: `5`
- [CVE-2024-24916](CVE-2024/CVE-2024-249xx/CVE-2024-24916.json) (`2025-06-19T14:15:44.983`)
- [CVE-2025-48886](CVE-2025/CVE-2025-488xx/CVE-2025-48886.json) (`2025-06-19T15:15:20.473`)
- [CVE-2025-49014](CVE-2025/CVE-2025-490xx/CVE-2025-49014.json) (`2025-06-19T15:15:20.650`)
- [CVE-2025-6267](CVE-2025/CVE-2025-62xx/CVE-2025-6267.json) (`2025-06-19T14:15:55.323`)
- [CVE-2025-6268](CVE-2025/CVE-2025-62xx/CVE-2025-6268.json) (`2025-06-19T15:15:20.810`)
- [CVE-2006-2192](CVE-2006/CVE-2006-21xx/CVE-2006-2192.json) (`2025-06-19T16:15:21.717`)
- [CVE-2025-50200](CVE-2025/CVE-2025-502xx/CVE-2025-50200.json) (`2025-06-19T17:15:26.123`)
- [CVE-2025-52464](CVE-2025/CVE-2025-524xx/CVE-2025-52464.json) (`2025-06-19T16:15:22.327`)
- [CVE-2025-6269](CVE-2025/CVE-2025-62xx/CVE-2025-6269.json) (`2025-06-19T16:15:22.797`)
- [CVE-2025-6270](CVE-2025/CVE-2025-62xx/CVE-2025-6270.json) (`2025-06-19T17:15:27.167`)
### CVEs modified in the last Commit
Recently modified CVEs: `4`
Recently modified CVEs: `0`
- [CVE-2021-47144](CVE-2021/CVE-2021-471xx/CVE-2021-47144.json) (`2025-06-19T14:15:24.327`)
- [CVE-2022-49299](CVE-2022/CVE-2022-492xx/CVE-2022-49299.json) (`2025-06-19T14:15:34.170`)
- [CVE-2024-36022](CVE-2024/CVE-2024-360xx/CVE-2024-36022.json) (`2025-06-19T14:15:45.160`)
- [CVE-2024-44955](CVE-2024/CVE-2024-449xx/CVE-2024-44955.json) (`2025-06-19T14:15:45.237`)
## Download and Usage

View File

@ -17972,6 +17972,7 @@ CVE-2006-2188,0,0,617fe8a4a09e7b96851372e97b83231f592dbb3159ef647dde40b46ceac345
CVE-2006-2189,0,0,0576f249e04a3de9327755edf16ff0fc7d99ef781d8921d2d63129ff759491a8,2025-04-03T01:03:51.193000
CVE-2006-2190,0,0,9ae4f0eafede6e9fed5380138af147cb08229abed1583537aaefc7557f022ccc,2025-04-03T01:03:51.193000
CVE-2006-2191,0,0,6b338e607701f7dec383a6fc9fc249b92a610ebc36d621236360932ef27c2e9c,2025-04-03T01:03:51.193000
CVE-2006-2192,1,1,b5fd94f6fcd9f7ee1155cb50046bb23693c266880888a8bb7f995dbf1552a256,2025-06-19T16:15:21.717000
CVE-2006-2193,0,0,77d6ce2e3d4ffa2845b02d5dc0ea7ad5da26e16633950d6ac62ccc91772a61ac,2025-04-03T01:03:51.193000
CVE-2006-2194,0,0,953a6f0d21137b2046a19b4e85cd492c231e8a29f885eb74f6894022211eedca,2025-04-03T01:03:51.193000
CVE-2006-2195,0,0,5dd93295f11b2006c6aa21449473d6ea5ae5c5ace2353ee86ac452c395c6152f,2025-04-03T01:03:51.193000
@ -187473,7 +187474,7 @@ CVE-2021-47140,0,0,c3dcf5ccce19de7e841d31a01af1a7c0a0ac783be101cc1ae90902a46a0b7
CVE-2021-47141,0,0,e61404ed12a5ac1ae29217dd66abf34d1c9993567a22e9f40130f3f47929515b,2024-12-20T13:52:15.857000
CVE-2021-47142,0,0,6ad377d956d05ee5b77de4a0fcd9c1e12bb267ce6b693f08e9c8a001b07f1a24,2024-12-17T14:56:12.967000
CVE-2021-47143,0,0,e3b00c03aadd7fe0eba996ce0aa700ffe68266a62c0c1a319c4d75334f72fab4,2025-03-13T21:09:12.133000
CVE-2021-47144,0,1,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000
CVE-2021-47144,0,0,45db3cba27ad95d1197ebaca09ce2daec1e6ac06a78c7071ee0d59a43f2c03bb,2025-06-19T14:15:24.327000
CVE-2021-47145,0,0,43d8e0b6ecfa4a172c868b86d0d689e74785d9a21693602a5589db57ba57a745,2024-12-20T13:54:08.207000
CVE-2021-47146,0,0,dbdc77471ed516b8586014a2485eb48d7b639119ac0499cf0380be4cece2ea03,2024-12-20T13:56:08.667000
CVE-2021-47147,0,0,8cffde98530a8168df40904390cfc1ac183830cade4d4bfa5b463711d25686fb,2024-11-21T06:35:29.547000
@ -213725,7 +213726,7 @@ CVE-2022-49295,0,0,5e38c4c123787e1ee751a94134f2b29ad572a5b12c9b6211fdebdc37dfbd2
CVE-2022-49296,0,0,588351356d12270e478dd63a43a961d11715903a90acd8e6708c24c601fcaa4b,2025-04-14T20:08:21.310000
CVE-2022-49297,0,0,8d1c06a4aa23def0f72824aed39805f1f922ad45e1d7b60048b08e6a7aa701f7,2025-02-26T07:01:06.527000
CVE-2022-49298,0,0,6ef51ed7003ff5ce2a107fdf5b5fd431bea1536c5c9ba8aad25226015ac10a10,2025-04-14T20:08:32.443000
CVE-2022-49299,0,1,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000
CVE-2022-49299,0,0,858e440c602b388e1110e4a6eed2edf8cf9a1182fd6623384ad6f3ad00234ba0,2025-06-19T14:15:34.170000
CVE-2022-4930,0,0,7e21b5888ba08ac9f714e1d7cc949231011fc7edea53dba39ac9bb8b71344e77,2024-11-21T07:36:16.550000
CVE-2022-49300,0,0,b797c5faa060878b9beb923e26a960451e4ac34b94b1fc227e08b825a7d5668b,2025-04-14T20:08:41.297000
CVE-2022-49301,0,0,136481d6f3b44bb5b873bb10b1c743de69545e148cb371975e40d2524eedecd4,2025-04-14T20:08:57.483000
@ -253939,7 +253940,7 @@ CVE-2024-24910,0,0,6b331799a881a5d956a87c006abe5e882f01b24bf255742ad3b49c624db6b
CVE-2024-24911,0,0,000ec366e410a6c31f93ab7f8a2e5fcf30159e4251e9a0263b609a65802a079d,2025-02-06T14:15:29.577000
CVE-2024-24912,0,0,7e4db9efaf9ed4fd90c3653c0c141095d6d30e8a8ae2098e663586572a626f62,2024-11-21T08:59:57.947000
CVE-2024-24914,0,0,6a184fa1912b50a75a0f68f12ef7de42e993a65d0e5eee8a5ac41cb6b37ddf0c,2024-11-08T19:01:03.880000
CVE-2024-24916,1,1,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000
CVE-2024-24916,0,0,f386f1592d60dd44d86fab84a74d22c9e2dceb453c216f7377cb501ea1221570,2025-06-19T14:15:44.983000
CVE-2024-24919,0,0,79021d06164055237b10fa49935e385f8096a39629b5d8ac929ac9e336c9c5cc,2025-01-27T21:42:18.743000
CVE-2024-2492,0,0,a9b15c0f5d53de03b8229afca1c8a7b4e7a78c54ba58e9584411863892de05ef,2025-01-09T17:01:54.423000
CVE-2024-24920,0,0,dc0bb25ed0284e07ee39402f3b0f41ee21d4b48f63522bd3cf324ad5fae05c1c,2024-11-21T08:59:58.420000
@ -262523,7 +262524,7 @@ CVE-2024-36019,0,0,f02053cb973e1c96d485baf06035b62edccf042bea033f3776e823e91a178
CVE-2024-3602,0,0,d3cbf668ee81c993c6c1a222abdc99fc263e0a164b77fb771b4ebab250b2fbc2,2024-11-21T09:29:57.953000
CVE-2024-36020,0,0,25e42c8a88f0ddc6971355bfaa1fe3e1077dd58b980e3b76b47fcef300a19108,2024-11-21T09:21:27.090000
CVE-2024-36021,0,0,e329f3d46bec53961296646b95182fcee51db869a5da34a000bb9ec4b09a82e5,2024-11-21T09:21:27.280000
CVE-2024-36022,0,1,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000
CVE-2024-36022,0,0,51dac97c1f219f060ef0fddf94e1fe59968e0e0d8f6538dfb52154bc9e602f12,2025-06-19T14:15:45.160000
CVE-2024-36023,0,0,e5bd5a963b07073a291c96616b254515ad4a6774864c3c2874fadf0832668b50,2024-11-21T09:21:27.523000
CVE-2024-36024,0,0,e81683da475e946ecb026d2acbb1cb6964660d51a3ff9882d05006bff012115d,2024-11-21T09:21:27.663000
CVE-2024-36025,0,0,33c56aef941738177fa17f1493b08e4d2d3a3e4eea32429e0a62f0a601334f80,2024-11-21T09:21:27.783000
@ -269449,7 +269450,7 @@ CVE-2024-44951,0,0,aa685e9643193f2a430154fe7087e89f1644d56a299d0e03a2a9efed4e0cd
CVE-2024-44952,0,0,6075a53e4a12ab3edde68b2f32d76123b685c2ffd8a80a3e387b8f8a1b55017c,2024-11-09T10:15:04.710000
CVE-2024-44953,0,0,d6bdfb63db04ea95627162f46f471f3f784f46dc1c5f5c5598b91e3343ece3d2,2025-03-07T18:15:40.950000
CVE-2024-44954,0,0,ca1483f1bc80b6fc317dee185ca5bfaca3fb71a4e1bb2be04aaa089f77305fa8,2024-10-10T18:02:42.307000
CVE-2024-44955,0,1,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000
CVE-2024-44955,0,0,e4a2492d3ee52c185351f510b38f12ba865b64e3f4b497cfe9040977e631629e,2025-06-19T14:15:45.237000
CVE-2024-44956,0,0,86920dddd41f37c850fb3187de0d04345b34edcff9616626c578c463883b545f,2024-09-06T16:37:11.777000
CVE-2024-44957,0,0,1cf763e8c9a7c6633066ea97c4cd268591794ba04e060d517e94af511c95351c,2024-09-06T16:37:00.077000
CVE-2024-44958,0,0,10ffa07c682ea617924ba9d633879bcec7023ba11be7e36066d5dd8fd1f703a6,2024-10-10T17:56:24.467000
@ -297392,7 +297393,7 @@ CVE-2025-48881,0,0,478c71cbb268c7668af9adbe8d9db873a15a6f0100cbc1765ad6b2fc8ccbe
CVE-2025-48882,0,0,0675a44f5475635d3b90df25f21b843f71a594f25b60ebf1257710a520ba2459,2025-06-02T17:32:17.397000
CVE-2025-48883,0,0,14507842d3e0b613f4c9b8d62ad8df05d93e1c97510cf43e163a8411a419850f,2025-06-02T17:32:17.397000
CVE-2025-48885,0,0,a22cad12e847f8e3d6cac2d0c207ccbc3235380976544a38095804a3e40d9d2f,2025-06-02T17:32:17.397000
CVE-2025-48886,1,1,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000
CVE-2025-48886,0,0,804fb54f649dfaed4a17820c45e257f12c5f661ecd7371b6b111563aa366ad58,2025-06-19T15:15:20.473000
CVE-2025-48887,0,0,d715c137954000dfa4d0fdb3ecdb8e16b928f4dac02dc271a6a5d4052e6a12f9,2025-06-19T00:55:27.710000
CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44ccf65,2025-06-05T20:12:23.777000
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
@ -297480,7 +297481,7 @@ CVE-2025-4901,0,0,e27cda4f5daf0c789b44760e4e5b993aff83932164a6246a45c2b68bff562e
CVE-2025-49011,0,0,3665e61b0cd57a602b77e200d37022bd1c16f58fa0f0e634b56cbf0760aaef11,2025-06-09T12:15:47.880000
CVE-2025-49012,0,0,2faa3b03d38706521ba412ef015f2b3ddc23776e15e89fc334c8483419ee59d3,2025-06-06T14:07:28.330000
CVE-2025-49013,0,0,53845c94e81c77646a01f8c00c78ad71027f55ce3164819fe14a34a7c91aff28,2025-06-12T16:06:47.857000
CVE-2025-49014,1,1,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000
CVE-2025-49014,0,0,856d9c372196e9d3a725054d166df8953c318647d8bc5aee2ea2794c95fb1a3a,2025-06-19T15:15:20.650000
CVE-2025-49015,0,0,7a51f7c5ae45f0bd54ecb4209bb2e64263c11f32f2190e16ff2a6f3efe9375e5,2025-06-18T15:15:27.550000
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
@ -297876,6 +297877,7 @@ CVE-2025-50182,0,0,93456784c188b1b8503b694ba28732c6770780f754e8588d4b113b9fa2491
CVE-2025-50183,0,0,577421c902a6680948fa734ac4a401e6dec872b90f6732d2f36c75be4e0482da,2025-06-19T03:15:25.717000
CVE-2025-5019,0,0,9e77689bce77b4f77cc10eef8ecd39dc784fee948cba6d9ab205fa6a8f33f986,2025-06-06T14:07:28.330000
CVE-2025-5020,0,0,a009d51287904279a69fbc7b7d45e7044fc45e21284eb97bd084f038009245ee,2025-06-13T18:55:32.903000
CVE-2025-50200,1,1,9dec4fb49ce3f8a9e6b4df92d9e0335c8d08c7812c1a7e6b320f4940f74207ae,2025-06-19T17:15:26.123000
CVE-2025-50201,0,0,6c0ac0a1b3f20c50cd6e6108194b16fda3c838e050a9f8f2f931be0a16f0b604,2025-06-19T04:15:49.340000
CVE-2025-50202,0,0,c82284387579a4d5287081c79bce5f56bb74234016b730f3d53b62b5739eec46,2025-06-18T13:46:52.973000
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
@ -298058,6 +298060,7 @@ CVE-2025-52444,0,0,93054904ad530554737df8cd7258142853cfe2090c496970f4b20356b1869
CVE-2025-52445,0,0,32bf5fa45c16b67da856f5d24d990c19398078dd71ca0f2526b5098284f3b5db,2025-06-17T03:15:25.673000
CVE-2025-5245,0,0,76dfb770c29fdb4cddbdbfbfa1fee59cf2a7272fa687dfaa6e702792fcfc63df,2025-05-28T15:01:30.720000
CVE-2025-5246,0,0,58006bd67e3ca573529b2f3e87b16b1c40180151481747e10351ab9236833e82,2025-05-28T20:38:00.033000
CVE-2025-52464,1,1,fe445d840cfd2d5fa387a02e4bee7c790147073ebbee6cc5031929c934267ddf,2025-06-19T16:15:22.327000
CVE-2025-52467,0,0,1d44b4ec1f24c8fb925117e58cded1f52726868651b6f32ac341ea831aaa464f,2025-06-19T03:15:25.870000
CVE-2025-5247,0,0,54e3a381cfd9dfdb05827b9f71ff8bbd85014209bf716148a0d5df41e284d42b,2025-05-28T15:01:30.720000
CVE-2025-52474,0,0,90aca3999fbf5ca7dd4557d7388545c99ea4ce981f2f9c8d02593988d225c460,2025-06-19T04:15:53.793000
@ -298706,5 +298709,7 @@ CVE-2025-6201,0,0,fae5d9a8c9dcb541916adb0b451bda886e1fe3141eb6c37705d42f0b95790d
CVE-2025-6220,0,0,5f7d83b19f9a74deb42015750f7b5335a45a31dba8653fadb3cf8eaf78a671be,2025-06-18T13:47:40.833000
CVE-2025-6240,0,0,afdbdd4423b9b6d85b5822d8414b4fba12d402c8710eb5b02e519fcba3d4ca1c,2025-06-18T15:15:28.187000
CVE-2025-6266,0,0,f88678c0ca6c6b4793348c364f2d4b51fa863b9a2b4f605e9b4cf59a8ae65084,2025-06-19T12:15:20.537000
CVE-2025-6267,1,1,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000
CVE-2025-6268,1,1,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000
CVE-2025-6267,0,0,abd4330b3858f9e21bdcec6fd248eb70ba09cf96ae2d8c82b03451247b5b4eab,2025-06-19T14:15:55.323000
CVE-2025-6268,0,0,6fa9140584959e948202f092432ac46aad7bd9559cbc482008db9c6d49de4338,2025-06-19T15:15:20.810000
CVE-2025-6269,1,1,30eec445a7f329623315e17a43279c26cfd7baf4f1b9b7e6b978e627caa57830,2025-06-19T16:15:22.797000
CVE-2025-6270,1,1,f7a2c6fa4812a82383b1679e78a47e55be72cdde4b381f8063bad680538f7f1f,2025-06-19T17:15:27.167000

Can't render this file because it is too large.