mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-10T12:00:22.759068+00:00
This commit is contained in:
parent
6bca101256
commit
482513dc96
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2022-4653",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-01-16T16:15:13.640",
|
||||
"lastModified": "2025-04-08T20:15:19.183",
|
||||
"lastModified": "2025-06-10T11:44:28.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -68,9 +68,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "4.8.9",
|
||||
"matchCriteriaId": "1E26D90F-41B7-4C4B-B040-2764BE0CB59F"
|
||||
"matchCriteriaId": "52F771CE-5D47-4208-B03A-9B080043F5E4"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-0378",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-02-21T09:15:12.600",
|
||||
"lastModified": "2025-03-12T21:15:40.490",
|
||||
"lastModified": "2025-06-10T11:44:28.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -64,9 +64,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "5.0",
|
||||
"matchCriteriaId": "7EF0CD45-1585-40D2-B584-E64F44113531"
|
||||
"matchCriteriaId": "E73DB4A1-0777-43D4-B48E-F3B0780EFD2F"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-22707",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2023-03-27T15:15:08.560",
|
||||
"lastModified": "2024-11-21T07:45:15.753",
|
||||
"lastModified": "2025-06-10T11:44:28.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -76,9 +76,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "4.9.9",
|
||||
"matchCriteriaId": "C92FBA4E-0733-485E-9542-0514D40D1961"
|
||||
"matchCriteriaId": "35EF8152-7FD9-4200-9BBF-591B75C9BB7A"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-3345",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2023-07-31T10:15:10.653",
|
||||
"lastModified": "2024-11-21T08:17:03.907",
|
||||
"lastModified": "2025-06-10T11:56:01.460",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -44,9 +44,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:masteriyo:masteriyo:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:themegrill:masteriyo:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "1.6.8",
|
||||
"matchCriteriaId": "68D5B983-C89A-4BE7-884D-3DB7D09BB2F1"
|
||||
"matchCriteriaId": "AC1A51BC-7B44-4FEA-AD0C-18BEB00E864C"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2023-6636",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2024-01-11T09:15:50.593",
|
||||
"lastModified": "2024-11-21T08:44:15.893",
|
||||
"lastModified": "2025-06-10T11:44:28.910",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndIncluding": "7.6.2",
|
||||
"matchCriteriaId": "2E956FA1-FD4C-4E46-8811-548D9DB1698D"
|
||||
"matchCriteriaId": "B43F2C55-B0F3-4DBE-A1EC-C0DAA2559BEC"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-12397",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-12-12T09:15:05.570",
|
||||
"lastModified": "2025-03-19T21:15:35.480",
|
||||
"lastModified": "2025-06-10T11:15:21.283",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -57,11 +57,11 @@
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:1082",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:3018",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:3018",
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:8761",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12743",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.003",
|
||||
"lastModified": "2025-05-20T20:15:32.620",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T11:53:54.447",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,14 +39,52 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:automattic:mailpoet:*:*:*:*:free:wordpress:*:*",
|
||||
"versionEndExcluding": "5.5.2",
|
||||
"matchCriteriaId": "FCB5746F-F16A-4FBA-9625-D409712BF6A2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7945f52d-364d-438c-84f2-cf19b4250056/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/7945f52d-364d-438c-84f2-cf19b4250056/",
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0"
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-12767",
|
||||
"sourceIdentifier": "contact@wpscan.com",
|
||||
"published": "2025-05-15T20:15:37.193",
|
||||
"lastModified": "2025-05-16T17:15:49.970",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-10T11:53:16.670",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -39,10 +39,44 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "2.7.60",
|
||||
"matchCriteriaId": "DC721A64-FEA3-46DB-97FC-90E8F42ADA59"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://wpscan.com/vulnerability/e8997f90-d8e9-4815-8808-aa0183443dae/",
|
||||
"source": "contact@wpscan.com"
|
||||
"source": "contact@wpscan.com",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-130xx/CVE-2024-13089.json
Normal file
100
CVE-2024/CVE-2024-130xx/CVE-2024-13089.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-13089",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2025-06-10T11:15:52.113",
|
||||
"lastModified": "2025-06-10T11:15:52.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An OS command injection vulnerability within the update functionality may allow an authenticated administrator to execute unauthorized arbitrary OS commands.\n\n\n\nUsers with administrative privileges may upload update packages to upgrade the versions of Nozomi Networks Guardian and CMC.\n\nWhile these updates are signed and their signatures are validated prior to installation, an improper signature validation check has been identified.\n\nThis issue could potentially enable users to execute commands remotely on the appliance, thereby impacting confidentiality, integrity, and availability."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "PRESENT",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.2,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.nozominetworks.com/NN-2025:1-01",
|
||||
"source": "prodsec@nozominetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
100
CVE-2024/CVE-2024-130xx/CVE-2024-13090.json
Normal file
100
CVE-2024/CVE-2024-130xx/CVE-2024-13090.json
Normal file
@ -0,0 +1,100 @@
|
||||
{
|
||||
"id": "CVE-2024-13090",
|
||||
"sourceIdentifier": "prodsec@nozominetworks.com",
|
||||
"published": "2025-06-10T11:15:52.477",
|
||||
"lastModified": "2025-06-10T11:15:52.477",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A privilege escalation vulnerability may enable a service account to elevate its privileges.\n\n\n\nThe sudo rules configured for a local service account were excessively permissive, potentially allowing administrative access if a malicious actor could execute arbitrary commands as that account.\n\nIt is important to note that no such vector has been identified in this instance."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.0,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "prodsec@nozominetworks.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-250"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://security.nozominetworks.com/NN-2025:2-01",
|
||||
"source": "prodsec@nozominetworks.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-13916",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-05-30T16:15:36.117",
|
||||
"lastModified": "2025-05-30T16:31:03.107",
|
||||
"lastModified": "2025-06-10T10:15:21.443",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.android.providers.settings.fingerprint.PriFpShareProvider\u201c content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability"
|
||||
"value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.android.providers.settings.fingerprint.PriFpShareProvider\u201c content provider's public method query() allows any other malicious application, without any granted Android system permissions, to exfiltrate the PIN code.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -64,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2024-13917",
|
||||
"sourceIdentifier": "cvd@cert.pl",
|
||||
"published": "2025-05-30T16:15:36.263",
|
||||
"lastModified": "2025-05-30T16:31:03.107",
|
||||
"lastModified": "2025-06-10T10:15:26.553",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nVendor did not provide information about vulnerable versions.\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability"
|
||||
"value": "An\u00a0application \"com.pri.applock\", which is pre-loaded on\u00a0Kruger&Matz smartphones, allows a user to encrypt any application using user-provided PIN code or by using biometric data.\nExposed \u201dcom.pri.applock.LockUI\u201c activity allows any other malicious application, with no granted Android system permissions, to inject an arbitrary intent with system-level privileges to a protected application. One must know the protecting PIN number (it might be revealed by exploiting\u00a0CVE-2024-13916) or ask the user to provide it.\n\nOnly version (version name: 13, version code: 33) was tested and confirmed to have this vulnerability. \nApplication update was released in April 2025."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -64,7 +64,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cvd@cert.pl",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-44005",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2024-09-18T00:15:09.887",
|
||||
"lastModified": "2024-09-25T15:25:30.083",
|
||||
"lastModified": "2025-06-10T11:44:28.910",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -80,9 +80,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:greenshiftwp:greenshift_-_animation_and_page_builder_blocks:*:*:*:*:*:wordpress:*:*",
|
||||
"criteria": "cpe:2.3:a:wpsoul:greenshift:*:*:*:*:*:wordpress:*:*",
|
||||
"versionEndExcluding": "9.4",
|
||||
"matchCriteriaId": "25384C7C-0D7F-4CF5-8DA2-11EBD17B30BA"
|
||||
"matchCriteriaId": "850EB61E-4D60-43E0-8533-4B1FE759DA18"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-2703",
|
||||
"sourceIdentifier": "security@grafana.com",
|
||||
"published": "2025-04-23T12:15:16.103",
|
||||
"lastModified": "2025-04-23T14:08:13.383",
|
||||
"lastModified": "2025-06-10T11:15:52.680",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -55,6 +55,10 @@
|
||||
{
|
||||
"url": "https://grafana.com/security/security-advisories/cve-2025-2703",
|
||||
"source": "security@grafana.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sonarsource.com/blog/data-in-danger-detecting-xss-in-grafana-cve-2025-2703/",
|
||||
"source": "security@grafana.com"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40654.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40654.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40654",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:26.990",
|
||||
"lastModified": "2025-06-10T10:15:26.990",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the name and cod parameters in /antbuspre.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40655.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40655.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40655",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:27.620",
|
||||
"lastModified": "2025-06-10T10:15:27.620",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the name parameter in /antcatalogue.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40656.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40656.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40656",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:27.843",
|
||||
"lastModified": "2025-06-10T10:15:27.843",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the cod parameter in /administer/node-selection/data.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40657.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40657.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40657",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:28.043",
|
||||
"lastModified": "2025-06-10T10:15:28.043",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A SQL injection vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to retrieve, create, update and delete databases through the codform parameter in /modules/forms/collectform.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40658.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40658.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40658",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:28.237",
|
||||
"lastModified": "2025-06-10T10:15:28.237",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelection.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40659.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40659.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40659",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:28.430",
|
||||
"lastModified": "2025-06-10T10:15:28.430",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/framesSelectionNetworks.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40660.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40660.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40660",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:28.627",
|
||||
"lastModified": "2025-06-10T10:15:28.627",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/select node/data.asp?mode=catalogue&id1=1&id2=1session=&cod=1&networks=0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40661.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40661.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40661",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:28.827",
|
||||
"lastModified": "2025-06-10T10:15:28.827",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An Insecure Direct Object Reference (IDOR) vulnerability has been found in DM Corporative CMS. This vulnerability allows an attacker to access the private area setting the\u00a0option parameter equal to 0, 1 or 2 in /administer/selectionnode/selection.asp."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-639"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-406xx/CVE-2025-40662.json
Normal file
78
CVE-2025/CVE-2025-406xx/CVE-2025-40662.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40662",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-06-10T10:15:29.103",
|
||||
"lastModified": "2025-06-10T10:15:29.103",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Absolute path disclosure vulnerability in DM Corporative CMS. This vulnerability allows an attacker to view the contents of webroot/file, if navigating to a non-existent file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-200"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-dm-corporative-cms-dmacroweb",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-416xx/CVE-2025-41657.json
Normal file
56
CVE-2025/CVE-2025-416xx/CVE-2025-41657.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-41657",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2025-06-10T11:15:53.150",
|
||||
"lastModified": "2025-06-10T11:15:53.150",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Due to an undocumented active bluetooth stack on products delivered within the period 01.01.2024 to 09.05.2025 fingerprinting is possible by an unauthenticated adjacent attacker."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-207"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://certvde.com/en/advisories/VDE-2025-047",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
56
README.md
56
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-10T10:00:20.202255+00:00
|
||||
2025-06-10T12:00:22.759068+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-10T09:15:25.930000+00:00
|
||||
2025-06-10T11:56:01.460000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,41 +33,43 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297243
|
||||
297255
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `16`
|
||||
Recently added CVEs: `12`
|
||||
|
||||
- [CVE-2025-27817](CVE-2025/CVE-2025-278xx/CVE-2025-27817.json) (`2025-06-10T08:15:22.367`)
|
||||
- [CVE-2025-27818](CVE-2025/CVE-2025-278xx/CVE-2025-27818.json) (`2025-06-10T08:15:22.533`)
|
||||
- [CVE-2025-27819](CVE-2025/CVE-2025-278xx/CVE-2025-27819.json) (`2025-06-10T08:15:22.687`)
|
||||
- [CVE-2025-3112](CVE-2025/CVE-2025-31xx/CVE-2025-3112.json) (`2025-06-10T09:15:23.437`)
|
||||
- [CVE-2025-3116](CVE-2025/CVE-2025-31xx/CVE-2025-3116.json) (`2025-06-10T09:15:23.657`)
|
||||
- [CVE-2025-3117](CVE-2025/CVE-2025-31xx/CVE-2025-3117.json) (`2025-06-10T09:15:23.873`)
|
||||
- [CVE-2025-3898](CVE-2025/CVE-2025-38xx/CVE-2025-3898.json) (`2025-06-10T09:15:24.137`)
|
||||
- [CVE-2025-3899](CVE-2025/CVE-2025-38xx/CVE-2025-3899.json) (`2025-06-10T09:15:24.333`)
|
||||
- [CVE-2025-3905](CVE-2025/CVE-2025-39xx/CVE-2025-3905.json) (`2025-06-10T09:15:24.543`)
|
||||
- [CVE-2025-4680](CVE-2025/CVE-2025-46xx/CVE-2025-4680.json) (`2025-06-10T09:15:24.753`)
|
||||
- [CVE-2025-4681](CVE-2025/CVE-2025-46xx/CVE-2025-4681.json) (`2025-06-10T09:15:24.933`)
|
||||
- [CVE-2025-5740](CVE-2025/CVE-2025-57xx/CVE-2025-5740.json) (`2025-06-10T09:15:25.093`)
|
||||
- [CVE-2025-5741](CVE-2025/CVE-2025-57xx/CVE-2025-5741.json) (`2025-06-10T09:15:25.290`)
|
||||
- [CVE-2025-5742](CVE-2025/CVE-2025-57xx/CVE-2025-5742.json) (`2025-06-10T09:15:25.493`)
|
||||
- [CVE-2025-5743](CVE-2025/CVE-2025-57xx/CVE-2025-5743.json) (`2025-06-10T09:15:25.703`)
|
||||
- [CVE-2025-5945](CVE-2025/CVE-2025-59xx/CVE-2025-5945.json) (`2025-06-10T08:15:22.883`)
|
||||
- [CVE-2024-13089](CVE-2024/CVE-2024-130xx/CVE-2024-13089.json) (`2025-06-10T11:15:52.113`)
|
||||
- [CVE-2024-13090](CVE-2024/CVE-2024-130xx/CVE-2024-13090.json) (`2025-06-10T11:15:52.477`)
|
||||
- [CVE-2025-40654](CVE-2025/CVE-2025-406xx/CVE-2025-40654.json) (`2025-06-10T10:15:26.990`)
|
||||
- [CVE-2025-40655](CVE-2025/CVE-2025-406xx/CVE-2025-40655.json) (`2025-06-10T10:15:27.620`)
|
||||
- [CVE-2025-40656](CVE-2025/CVE-2025-406xx/CVE-2025-40656.json) (`2025-06-10T10:15:27.843`)
|
||||
- [CVE-2025-40657](CVE-2025/CVE-2025-406xx/CVE-2025-40657.json) (`2025-06-10T10:15:28.043`)
|
||||
- [CVE-2025-40658](CVE-2025/CVE-2025-406xx/CVE-2025-40658.json) (`2025-06-10T10:15:28.237`)
|
||||
- [CVE-2025-40659](CVE-2025/CVE-2025-406xx/CVE-2025-40659.json) (`2025-06-10T10:15:28.430`)
|
||||
- [CVE-2025-40660](CVE-2025/CVE-2025-406xx/CVE-2025-40660.json) (`2025-06-10T10:15:28.627`)
|
||||
- [CVE-2025-40661](CVE-2025/CVE-2025-406xx/CVE-2025-40661.json) (`2025-06-10T10:15:28.827`)
|
||||
- [CVE-2025-40662](CVE-2025/CVE-2025-406xx/CVE-2025-40662.json) (`2025-06-10T10:15:29.103`)
|
||||
- [CVE-2025-41657](CVE-2025/CVE-2025-416xx/CVE-2025-41657.json) (`2025-06-10T11:15:53.150`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `6`
|
||||
Recently modified CVEs: `12`
|
||||
|
||||
- [CVE-2020-7533](CVE-2020/CVE-2020-75xx/CVE-2020-7533.json) (`2025-06-10T08:15:21.423`)
|
||||
- [CVE-2024-13915](CVE-2024/CVE-2024-139xx/CVE-2024-13915.json) (`2025-06-10T09:15:22.463`)
|
||||
- [CVE-2024-2318](CVE-2024/CVE-2024-23xx/CVE-2024-2318.json) (`2025-06-10T08:15:21.797`)
|
||||
- [CVE-2024-45478](CVE-2024/CVE-2024-454xx/CVE-2024-45478.json) (`2025-06-10T09:15:22.687`)
|
||||
- [CVE-2024-45479](CVE-2024/CVE-2024-454xx/CVE-2024-45479.json) (`2025-06-10T09:15:23.043`)
|
||||
- [CVE-2024-6807](CVE-2024/CVE-2024-68xx/CVE-2024-6807.json) (`2025-06-10T08:15:22.123`)
|
||||
- [CVE-2022-4653](CVE-2022/CVE-2022-46xx/CVE-2022-4653.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-0378](CVE-2023/CVE-2023-03xx/CVE-2023-0378.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-22707](CVE-2023/CVE-2023-227xx/CVE-2023-22707.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2023-3345](CVE-2023/CVE-2023-33xx/CVE-2023-3345.json) (`2025-06-10T11:56:01.460`)
|
||||
- [CVE-2023-6636](CVE-2023/CVE-2023-66xx/CVE-2023-6636.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2024-12397](CVE-2024/CVE-2024-123xx/CVE-2024-12397.json) (`2025-06-10T11:15:21.283`)
|
||||
- [CVE-2024-12743](CVE-2024/CVE-2024-127xx/CVE-2024-12743.json) (`2025-06-10T11:53:54.447`)
|
||||
- [CVE-2024-12767](CVE-2024/CVE-2024-127xx/CVE-2024-12767.json) (`2025-06-10T11:53:16.670`)
|
||||
- [CVE-2024-13916](CVE-2024/CVE-2024-139xx/CVE-2024-13916.json) (`2025-06-10T10:15:21.443`)
|
||||
- [CVE-2024-13917](CVE-2024/CVE-2024-139xx/CVE-2024-13917.json) (`2025-06-10T10:15:26.553`)
|
||||
- [CVE-2024-44005](CVE-2024/CVE-2024-440xx/CVE-2024-44005.json) (`2025-06-10T11:44:28.910`)
|
||||
- [CVE-2025-2703](CVE-2025/CVE-2025-27xx/CVE-2025-2703.json) (`2025-06-10T11:15:52.680`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
80
_state.csv
80
_state.csv
@ -162816,7 +162816,7 @@ CVE-2020-7529,0,0,4bcdbc968e0da9a37524428e76a4148c588e10a92679dfbd0f518220c3b1a3
|
||||
CVE-2020-7530,0,0,c76dc52352d9d98e85b5840da2c0e0ed0d20db2ad16c23d2f35040b966d54081,2024-11-21T05:37:19.293000
|
||||
CVE-2020-7531,0,0,9c3aba180e960e5350023170088f6ffdc5e62432721db44383c204d529282003,2024-11-21T05:37:19.403000
|
||||
CVE-2020-7532,0,0,76e86d6c962e42324fde6ee04b52d6776179a4116faff2cf98a15d4c4037472f,2024-11-21T05:37:19.513000
|
||||
CVE-2020-7533,0,1,f7c6f6ae323dac3ada05e6dbad6c4592d9ad949375b7c9d360f27e2e44b3dc72,2025-06-10T08:15:21.423000
|
||||
CVE-2020-7533,0,0,f7c6f6ae323dac3ada05e6dbad6c4592d9ad949375b7c9d360f27e2e44b3dc72,2025-06-10T08:15:21.423000
|
||||
CVE-2020-7534,0,0,d7f036d5a2c2d6d4d9cb273d7692b03687aea8bac74d549f6387ee4c045e072b,2024-11-21T05:37:19.763000
|
||||
CVE-2020-7535,0,0,0c94cbbeb495c1b938f0e86e81e282f12cf39179c85b251e5f8fc2ee2c889dca,2024-11-21T05:37:19.907000
|
||||
CVE-2020-7536,0,0,7676351ea1e300143f4ff7318fbf8f9088f3c9caf8045b78f380e7159876763d,2024-11-21T05:37:20.047000
|
||||
@ -211563,7 +211563,7 @@ CVE-2022-46505,0,0,556f68f80f426556fa441caaf3ece3247d1f844d1ca10adaa553eb4ec2d51
|
||||
CVE-2022-4651,0,0,e7cf4a70afca20f66b5af34080804c6864be6d29e3a2f96826c8a4a51fcc2990,2025-03-27T16:15:17.703000
|
||||
CVE-2022-4652,0,0,1095194f9f154259f49411f7dbb93d1a6c03863c10e1a5c3e3727f220f6e9465,2025-02-27T21:15:16.310000
|
||||
CVE-2022-46527,0,0,d02de0aae02127d126346be665f04f296ca7c58b711b92b26e017819accbd88f,2024-11-21T07:30:40.330000
|
||||
CVE-2022-4653,0,0,5e04a4070d5781883e868846a741d01bc94f599a545343e05bb5833cc37628eb,2025-04-08T20:15:19.183000
|
||||
CVE-2022-4653,0,1,fdf82423452f9f1fb82a2b67a45692e54bb1a5e54d616807d8d22fd37f4fe533,2025-06-10T11:44:28.910000
|
||||
CVE-2022-46530,0,0,af2bb5ee46d936d244c92c467e760d00274999c52ba2494e2e4cdcdcdf8c1946,2025-04-16T18:15:59.500000
|
||||
CVE-2022-46531,0,0,2ac78f73b3153ff5c8e9907f04f29148da22e1ff69025d5820fd91be844de458,2025-04-16T16:15:25.327000
|
||||
CVE-2022-46532,0,0,432e2fb1ac9231e3900f9510862b24af15ae515bd54591843ed70bfaf195023c,2025-04-16T16:15:25.507000
|
||||
@ -214767,7 +214767,7 @@ CVE-2023-0374,0,0,ae4f5db6eb936a3b818c45a588550c93b15d5a51af99d7e2373040cf12eb9f
|
||||
CVE-2023-0375,0,0,8948a3962bbed5c7e344609d7d5077346684df9a4b1ebdbb684540f03777e60c,2025-03-12T21:15:40.340000
|
||||
CVE-2023-0376,0,0,a9f6de5e0668ec86ac889cde4b7f40c1edd842c95af7ba6f28a9a7a5f9cf4a27,2025-06-02T15:15:21.640000
|
||||
CVE-2023-0377,0,0,9985f7addb4b6395ecb8f44f70b75d5f0a14376de7e9bfa2d4adc8dd24e4447a,2024-11-21T07:37:04.600000
|
||||
CVE-2023-0378,0,0,736996cb01e7855e9d6ff04f5f36851f6d27f466bd855e3b2600330380ed8d08,2025-03-12T21:15:40.490000
|
||||
CVE-2023-0378,0,1,7dc9c8b5c6c13deeff5b72af52f9f6595c5c49fc084d53f7ddaadbb20c2bfd1d,2025-06-10T11:44:28.910000
|
||||
CVE-2023-0379,0,0,45a21024b71eac3a3ff03943f6ddf52c72280bcd61f1cdeff5ae8ab462791d33,2025-03-21T15:15:39.677000
|
||||
CVE-2023-0380,0,0,e199a00c1e1579f86574b186fac08be1b5ee641379e96e857389051cc7026e5d,2025-03-14T19:15:40.897000
|
||||
CVE-2023-0381,0,0,fb963192539a86802660cecf1f4984bcbc8442d3688b92930e1e773c336353cb,2025-03-18T15:15:42.723000
|
||||
@ -218726,7 +218726,7 @@ CVE-2023-22703,0,0,b11cbe66777334b92d49ab1285216c2daf10bc1ade9e60e348ec608d69ec7
|
||||
CVE-2023-22704,0,0,3391b5e9fe8cfdb113a4335180cf222b3480dc9186971ddf99b9d7c23f514db4,2024-11-21T07:45:15.363000
|
||||
CVE-2023-22705,0,0,af778e225555747df5c233219acb78451206239cdbd1890f1bc52e0b4eff1577,2025-02-20T18:34:50.990000
|
||||
CVE-2023-22706,0,0,ebe261333ec94aa8d06d2c8f8fa51152653338e9e5613bd8d3569a6f53cb90e2,2024-11-21T07:45:15.623000
|
||||
CVE-2023-22707,0,0,83b334ee529eefc9ab11f726a4a33783ae7ec49b01a932387d3ab561fdacf988,2024-11-21T07:45:15.753000
|
||||
CVE-2023-22707,0,1,0bb7c425aded4142ebbe2c9be8b3883425d1ae75e2be1d4c2d9e6d8ce6aee24b,2025-06-10T11:44:28.910000
|
||||
CVE-2023-22708,0,0,0bda0fb09283863451e953094b448349ab539148689b6d150d6367fafec54d48,2024-12-09T13:15:20.260000
|
||||
CVE-2023-22709,0,0,b97092a949b7838108594a0e4a6775ddf43d90533b1340d5130b127236ed7e78,2024-11-21T07:45:15.890000
|
||||
CVE-2023-2271,0,0,82a1b193d56a689b6f14541ed8547a7aebaefaa1fa98350a6f5d11be1c01604a,2024-11-21T07:58:17.063000
|
||||
@ -227388,7 +227388,7 @@ CVE-2023-33439,0,0,f3af0a0427500f94c6b3b138f4e3fa36fb9bfc88f5c6b1efc27138be8bba0
|
||||
CVE-2023-3344,0,0,be98701b195b53def24896f087665cc45329af9abedde7087f97191910e5fedc,2025-05-05T16:15:45.150000
|
||||
CVE-2023-33440,0,0,6eb23ef764cdc1e6f8c91c5365c2450f157a6eae9d074cfe3f802aeee1be7620,2025-01-14T21:15:08.377000
|
||||
CVE-2023-33443,0,0,6c4ad59b45035b5c88ac135965bacacb2dedc93413c60d04ce25fba05f45224c,2025-01-06T21:15:10.830000
|
||||
CVE-2023-3345,0,0,219d5c772aa02f0c4a4b16b09721d8934adb3c1505c85a870be2fa6ad37ab3fd,2024-11-21T08:17:03.907000
|
||||
CVE-2023-3345,0,1,e53d94e79d9c9c1cb78413356db8a04c067360ae09c43cc3b085129675d26070,2025-06-10T11:56:01.460000
|
||||
CVE-2023-33457,0,0,7eee79e2e603000fdc9c79d0c7f54a28226aded759ba1bc0cbce35446680feba,2025-01-08T16:15:29.587000
|
||||
CVE-2023-3346,0,0,09f68a6670d4a69cff8e11fa4ad9eea39d73cc8d7fe0a2dacd2a911bbd61aee1,2024-11-21T08:17:04.037000
|
||||
CVE-2023-33460,0,0,6e418258c1a2b91b79efff9c4f69791d5894d1876ad79ba0f82b40a9644edd3e,2025-01-08T17:15:12.020000
|
||||
@ -243531,7 +243531,7 @@ CVE-2023-6632,0,0,b1c54670c8f8c580830f651c478abdde4fbaf49444ee1158170f1e733bd098
|
||||
CVE-2023-6633,0,0,8de7c9ebad96e1b1e63f7ee0917437d9c45b07d67508fbd0e4ab2d9fea33ad99,2024-11-21T08:44:15.430000
|
||||
CVE-2023-6634,0,0,4af0f8971e0f53e2ae5ef41811e9e37b2a73aed3245e588807fa0f78f7b0d874,2025-06-03T14:15:38.520000
|
||||
CVE-2023-6635,0,0,b930d159660c5d2dffbcce188a715975fef9441e89d59344c487a6ad08f8bfaa,2025-05-15T20:15:29.143000
|
||||
CVE-2023-6636,0,0,429cb004753d2958d8159d67d03a4c3da4034ff661609c524ad4820a55c5adc8,2024-11-21T08:44:15.893000
|
||||
CVE-2023-6636,0,1,0f338d074e17636e80ea5e1670bcee09c12c45a9dacacebb343d78dfc70dbbc9,2025-06-10T11:44:28.910000
|
||||
CVE-2023-6637,0,0,7c52b1639bf05012c19eced66616ae6b856e66a997b8457370ac22577ad50c58,2025-06-03T14:15:38.693000
|
||||
CVE-2023-6638,0,0,8202a3e7efa91557985af40a6a0d3f94586e929450e1bc51f40a6c7f47210d9b,2025-06-03T14:15:39.293000
|
||||
CVE-2023-6640,0,0,4c1de3385a32f286c0b75b0b253dae7e11e4d89cf203bb099ad3f58f6c385c6a,2025-02-12T16:52:28.897000
|
||||
@ -247531,7 +247531,7 @@ CVE-2024-12392,0,0,a8156bd94e9672d4635a84a6a0bddbfa7b852dc1cc5b768dabdbd22341a78
|
||||
CVE-2024-12393,0,0,0bb58765d8feb8f28285c647b089ee899cbf94b23d666e28361039e2bb2522cf,2025-06-02T16:21:01.907000
|
||||
CVE-2024-12394,0,0,c9fba954279bfd0e370c88894a9572158e1b0315e8ae3de4dd675a4e1ed310f4,2025-01-09T11:15:13.310000
|
||||
CVE-2024-12395,0,0,75ff5ef98722c35fb11d383db877ddbb73a300c7cb334e918191d763e24090f0,2024-12-17T12:15:20.377000
|
||||
CVE-2024-12397,0,0,05ba7e0b8df1e3d8b761874a9aada6fc62cc7d0aeb21c968842feab985ace9d8,2025-03-19T21:15:35.480000
|
||||
CVE-2024-12397,0,1,0f39153bc1d1ac0d13fae9e507b21fa619e36a6fa865060fa716d3d92d7c36e3,2025-06-10T11:15:21.283000
|
||||
CVE-2024-12398,0,0,3ddf453ac35312a996d38b789ad3b4ef0601d638e0d2eee33b4135d2d780af47,2025-01-21T21:12:02.310000
|
||||
CVE-2024-12399,0,0,52bff9c41a163f77665f2da9fc0a8dd83c998cfb340cf3f1d77c6844e18524bb,2025-01-17T10:15:06.697000
|
||||
CVE-2024-1240,0,0,28733ede53b96385ee0de4a7c5187b3db0d925b1e4ab6e977522dc277dee75de,2024-11-19T19:04:53.913000
|
||||
@ -247880,7 +247880,7 @@ CVE-2024-1274,0,0,f1db1f9b98565ee12acd91ee04a48a5ea9d9022420902832299251e567dee9
|
||||
CVE-2024-12740,0,0,e6c4d03a8c2935c7f946e2ddf8fb2efb52eeb4b7b990af277f1511faff48b8c0,2025-01-27T18:15:36.743000
|
||||
CVE-2024-12741,0,0,8d4c06d6204bde3983a442ab297408366d3d8d84bd77eb948d96a8745c52828f,2024-12-18T20:15:22.390000
|
||||
CVE-2024-12742,0,0,d58ef6138e359837d0633f7d853b532ab5b996d40e60c1b8567bd5b194ec44e0,2025-03-06T17:15:17.740000
|
||||
CVE-2024-12743,0,0,62e1184f57129404b8941aacc25c68e38e14fd392dd612ecdadef7bd57a7bdd1,2025-05-20T20:15:32.620000
|
||||
CVE-2024-12743,0,1,d47e3f3c79c8d0a3041386d9c423398edff04065d61dbea54e5f1c9b09640b4b,2025-06-10T11:53:54.447000
|
||||
CVE-2024-12744,0,0,d9bcd7b60c79640d4995955dca329cb96a3574a3f475005b85edf507783c7d57,2024-12-26T15:15:06.290000
|
||||
CVE-2024-12745,0,0,56f1c84b33bef267b3eb5e88e8c9c1273071ba9706fba6301263255413a17152,2024-12-26T15:15:06.527000
|
||||
CVE-2024-12746,0,0,3dc399827dbe6da7d4657aa1f300fc1452e75823ea53e19ad5a88d067d48a8c0,2024-12-26T15:15:06.650000
|
||||
@ -247903,7 +247903,7 @@ CVE-2024-12763,0,0,828b2bb544f2e61dd11f51daf4dde3c9326c6a38ab958bf084c901608bda1
|
||||
CVE-2024-12764,0,0,520ef7a415b759131cb40460656f8f00fedd52ee179d3018b43ad66d1c2ea33c,2025-02-11T02:15:33.817000
|
||||
CVE-2024-12765,0,0,f7917c17906425e707a3ca48a19a2a85665883890f2e41423afe14a68f13711c,2025-02-11T02:15:33.873000
|
||||
CVE-2024-12766,0,0,9649c1c42978a503b019c31f940763a525ea514d4d13ceba23be095167719680,2025-03-20T14:15:18.387000
|
||||
CVE-2024-12767,0,0,0d418cb8d56acc0fdcc9ff3b4928fd9f3dc695660cec1404cca944d3f5b3b5e5,2025-05-16T17:15:49.970000
|
||||
CVE-2024-12767,0,1,6593b5f975dfd5395109e7e47c23143559826c2e726fd8f4f452ca566e9cbeac,2025-06-10T11:53:16.670000
|
||||
CVE-2024-12768,0,0,cbf9ff20e80bb09942852fa2e956342eb17e9d4f27cf212ff4c0d8344126a292,2025-05-12T01:04:06.597000
|
||||
CVE-2024-12769,0,0,55524fcacc88be74a2aaad2cb01ce12a99e5536d12743064ed3841d6d460e936,2025-04-29T17:54:19.490000
|
||||
CVE-2024-1277,0,0,2a6d3c94fab76f050717b5ee760be8ca9b7ac565da514f487f74b0cc7aeb5545,2025-03-04T12:34:06.490000
|
||||
@ -248227,7 +248227,9 @@ CVE-2024-13085,0,0,162bf1e91a247b7e6da6855dca3faf3ee63c65213e4a36036c19ad648c40f
|
||||
CVE-2024-13086,0,0,7ac42c524055e40fca53eb99442db6298fae490b3d2a5b9bd9dde151851588be,2025-03-07T17:15:18.430000
|
||||
CVE-2024-13087,0,0,de9220c2f3228338d6992a72f028e115aecfe3e99735d21a56e1a464c6d673c9,2025-06-09T12:15:47.880000
|
||||
CVE-2024-13088,0,0,f092e286d50e3d3e98d13de53109368260b6d1e8323f34fd9cce2a144359b3de,2025-06-09T12:15:47.880000
|
||||
CVE-2024-13089,1,1,f5454d17f3f57010b12e68642616d13cb796efaa305513504b071cad5533df66,2025-06-10T11:15:52.113000
|
||||
CVE-2024-1309,0,0,46059633232401d149997e4f4dfdb966bb51f1c7d1649dc6d177fd25783e7c4a,2024-11-22T20:03:02.910000
|
||||
CVE-2024-13090,1,1,f59bcd6fcdd4929ff55844b6e1f081fff64cd2cd1ab56a6fb30361561be373be,2025-06-10T11:15:52.477000
|
||||
CVE-2024-13091,0,0,e9978d25b15eb759e2bc9cfbde0802cf5e89ad556f7a4c0b02504deb75ff452d,2025-01-24T18:42:25.563000
|
||||
CVE-2024-13092,0,0,a2750c0c790f467a547694b70414fe45b0b02ded27bb4d4c2a0fae1c1a0700ca,2025-04-03T14:45:17.077000
|
||||
CVE-2024-13093,0,0,cb18337e8ee0e8d57eaca2c3b85d5fad081ebf6db3df956f09ca020aa48a7de0,2025-04-03T14:43:53.770000
|
||||
@ -249098,9 +249100,9 @@ CVE-2024-13910,0,0,6885427b6394b62d7dcb79523e61be62dd8281aad81e8cab0af59c67e1bee
|
||||
CVE-2024-13911,0,0,4ecdacf9340f565972d67d0fd0f16ebfb137c877e410b587b04d73d76789b018,2025-03-01T08:15:33.803000
|
||||
CVE-2024-13913,0,0,97e9263ea64a11bf1d9dd911c989e4107d7a928b53ec2e2ca6bd3929a0fde8a1,2025-03-14T06:15:24.490000
|
||||
CVE-2024-13914,0,0,2af344b4b59c1a7104b4453c8c333847114f5fbef4676b0e1849066fad060e76,2025-05-16T14:43:26.160000
|
||||
CVE-2024-13915,0,1,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000
|
||||
CVE-2024-13916,0,0,1c86da198e7ad03ce361d7ce29aaeaaf2aee1adf8190249fefeb9d64238107dd,2025-05-30T16:31:03.107000
|
||||
CVE-2024-13917,0,0,79aaa8862ed6cde99f132d7719a925663858e201dfad9471c9e04355fd7d8561,2025-05-30T16:31:03.107000
|
||||
CVE-2024-13915,0,0,6fe2f006afc76e62529cad238e1d7c5fa1e81ebbb017ddd7987d1601087231ea,2025-06-10T09:15:22.463000
|
||||
CVE-2024-13916,0,1,616a3a974a6f01de2c87e25818465d874537e8e70683ef59a680af8227940de2,2025-06-10T10:15:21.443000
|
||||
CVE-2024-13917,0,1,d7f074eb3bc2e28f3b38b1720523e72dbce348ba1de7ad8e965baa1b1f59ff10,2025-06-10T10:15:26.553000
|
||||
CVE-2024-13918,0,0,42b43ee8cd03c685390e4720249fe990efc04f95289c224e1def5175db4f83ef,2025-03-24T14:15:59
|
||||
CVE-2024-13919,0,0,e47cf885ddbb3552eadad29313f1bea2b10cd197fed90bc6c347d954f876d2b0,2025-03-24T14:14:53.337000
|
||||
CVE-2024-1392,0,0,7d376d426c7bde42291bb43e543815dd80a04cb004b570eb44a0e5840366c498,2025-01-17T19:53:57.010000
|
||||
@ -252287,7 +252289,7 @@ CVE-2024-23174,0,0,b365b4a7fe1ddb2e20fb66243fbd5adf68894f7b7cd98618c8d61e49dd2ec
|
||||
CVE-2024-23177,0,0,657988e82fc58793fb35144a73273b10bccc46bb10e02359ba79eb0adb30003e,2025-06-03T14:15:46.497000
|
||||
CVE-2024-23178,0,0,4f65f9875f3e43b2db767153c71363ddbe13dd87e4f9f4f76dc9f3b3643a1450,2025-06-03T14:15:46.693000
|
||||
CVE-2024-23179,0,0,8fe0b61f68b15248ff6f58e9fa788ade334a5eb3775d6fe6f432905314bfee6f,2024-11-21T08:57:07.983000
|
||||
CVE-2024-2318,0,1,4f719f579c6a416a19438c2c6d49f17790490188c2a9a2cb141bb0ba42b01e16,2025-06-10T08:15:21.797000
|
||||
CVE-2024-2318,0,0,4f719f579c6a416a19438c2c6d49f17790490188c2a9a2cb141bb0ba42b01e16,2025-06-10T08:15:21.797000
|
||||
CVE-2024-23180,0,0,ffa291fdcb2038e838e41bc7a77aceea4655e19526604527988f8ee139c2d66a,2025-06-04T16:15:29.313000
|
||||
CVE-2024-23181,0,0,a08c47ff39f6f27a6222d039572c5b3f922cabf077166b961c152ed71ef139aa,2024-11-21T08:57:08.347000
|
||||
CVE-2024-23182,0,0,bea03d623844f4fae489adb4af1b45de0402092d2fffc22402486a79a22f10dc,2025-05-30T15:15:34.027000
|
||||
@ -268587,7 +268589,7 @@ CVE-2024-44001,0,0,175a5c76eaa0c47ffbee0289add49207844bb4c67d99ffcbaaa126343821b
|
||||
CVE-2024-44002,0,0,fb0f9d9f4deabfd4ae1435b962e7db8b5241e501eddbb5d325e8dc3232296abc,2024-09-25T20:06:13.100000
|
||||
CVE-2024-44003,0,0,23e0564b892dd423e7259e31c83d1277fbb7208f6d70fd5f18df7ac3fcafb2ea,2024-09-25T20:03:29.867000
|
||||
CVE-2024-44004,0,0,bbc19a7af2ebbf830c254cf451b28c5ea08ca0da1e15859da6b1d1952425238b,2024-09-24T19:22:14.760000
|
||||
CVE-2024-44005,0,0,444ceaf4fc88ad7c815dbe7f8ebee5e9b48e322f542430761c5fd31dffd62e35,2024-09-25T15:25:30.083000
|
||||
CVE-2024-44005,0,1,96a48922146014b4096b0e3da854976801051d3d24069d441538abeeacd253ac,2025-06-10T11:44:28.910000
|
||||
CVE-2024-44006,0,0,07a7b2d93672ddd0e2d64af483cf570ba63f1e65d2ff5fdafe3c8385cb34625a,2024-11-08T21:08:38.960000
|
||||
CVE-2024-44007,0,0,eb31863e8cc5fd1d114916effb9a6848710b326ebc0b4750aa792a8d30574b0c,2024-09-24T22:08:52.857000
|
||||
CVE-2024-44008,0,0,f7af8bcf24d7662d22f83ecd74e944dec78b8e1307eefd0e495f38cb1e19aae0,2024-09-24T22:08:01.060000
|
||||
@ -269606,8 +269608,8 @@ CVE-2024-45474,0,0,0330c0a050b47ef4dac408e17e94f7b65d5f673de4ba016262e4ba29a6154
|
||||
CVE-2024-45475,0,0,917726b522de021fb94492588041b210e1311150d54a008d8bc77ac4f1e2d46a,2024-12-10T14:30:43.673000
|
||||
CVE-2024-45476,0,0,af2645c959f7fb40898aee3a6516acece8ac0169d007f0fa6a4f1b42b4456564,2024-12-10T14:30:43.853000
|
||||
CVE-2024-45477,0,0,e64486945a7233685155bac32e1cee1ee1baed194f1170f1d979f1137af05eea,2024-11-21T09:37:50.293000
|
||||
CVE-2024-45478,0,1,88c76a6576896123f03dd4b9980d5337fc1f5a01d914774be128ca19ee9a54dd,2025-06-10T09:15:22.687000
|
||||
CVE-2024-45479,0,1,84bec843f91bb21db5ef2ec2468b56bbd8299993819e1572bac37f7cb4bdb8be,2025-06-10T09:15:23.043000
|
||||
CVE-2024-45478,0,0,88c76a6576896123f03dd4b9980d5337fc1f5a01d914774be128ca19ee9a54dd,2025-06-10T09:15:22.687000
|
||||
CVE-2024-45479,0,0,84bec843f91bb21db5ef2ec2468b56bbd8299993819e1572bac37f7cb4bdb8be,2025-06-10T09:15:23.043000
|
||||
CVE-2024-4548,0,0,c7401b17e35ff1b34998f05de06d9924efc8296217fd62d20718b595e94aba23,2024-11-21T09:43:04.937000
|
||||
CVE-2024-45480,0,0,6f8c399265c28d8f30d1be5584149815f4f10b4a9a7604b6361eb6f6588833d9,2025-03-27T16:45:46.410000
|
||||
CVE-2024-45481,0,0,af204bcc6a197076943be1004764d4663ee00d5011c570a2bf5a36bfaae8814c,2025-03-27T16:45:46.410000
|
||||
@ -279394,7 +279396,7 @@ CVE-2024-6803,0,0,c9d0d2c3d0be3aefc707e36eaf28cd5ea3dcf93c01833cc1b0e4aab37df6e1
|
||||
CVE-2024-6804,0,0,5addc897df7d832e4b0119316199dc712939d8129e5c666ecdfe3d141c170f4d,2024-09-12T21:31:45.747000
|
||||
CVE-2024-6805,0,0,1c210d059e5406d15a939f7588c555a69c38d162b88d34499e6d9a21643fd31d,2024-11-21T09:50:21.653000
|
||||
CVE-2024-6806,0,0,bd9029223cfe8d0849ca636b94ad7a5588631303a0efbbe7c8640e9f42ceb678,2024-11-21T09:50:21.780000
|
||||
CVE-2024-6807,0,1,5e55c9668d3f0b7997efaa63dbf72073e6e305e1f8180a43358b0dfbd1ca2f01,2025-06-10T08:15:22.123000
|
||||
CVE-2024-6807,0,0,5e55c9668d3f0b7997efaa63dbf72073e6e305e1f8180a43358b0dfbd1ca2f01,2025-06-10T08:15:22.123000
|
||||
CVE-2024-6808,0,0,69f62605e7fb121e33aa81824d018e7482a9cb46dab12ce4cdf216b5192e6597,2024-11-21T09:50:22.057000
|
||||
CVE-2024-6809,0,0,f0c95020a6da6e2550d0224d353969ecf7c3932c45d2c1e469fdf78eb5c6babc,2025-06-05T14:21:45.653000
|
||||
CVE-2024-6810,0,0,3aa0289c5b55c0813f23eeba3dd4eab1a11c03e2079bbbda39ffbd6f73ab2601,2025-02-26T13:15:40.600000
|
||||
@ -289111,7 +289113,7 @@ CVE-2025-27017,0,0,487799b83e349646c0969a6714868b1c6a1e0d2f10d5e6737c1115cacdd0b
|
||||
CVE-2025-27018,0,0,48d58c9e9c902b1eaa7722cd7e4f3337c69ebc3fec7269de4a4a5a702e3570f7,2025-06-03T21:11:28.860000
|
||||
CVE-2025-2702,0,0,7ef0bfa66e07c4fb7c181b57cab1217f373873ecf500d50de0d874610b07459c,2025-03-24T10:15:12.943000
|
||||
CVE-2025-27029,0,0,f19508e0628f7c772651f93e1b12fe9874fd4060cecec22f220c71602c00f8da,2025-06-04T14:54:33.783000
|
||||
CVE-2025-2703,0,0,1cd2ec1071e8a854a09aaa20f8e960bae5b0d0c1a938baebd649e294b60810d4,2025-04-23T14:08:13.383000
|
||||
CVE-2025-2703,0,1,d5ea40e178148932f49d90ec4c309716760c7d3b1ed975c047629950db3be6df,2025-06-10T11:15:52.680000
|
||||
CVE-2025-27031,0,0,9fa4d5238e55dfabc5a9becc0748532469d6008767dbc00fd4050a94f50be84d,2025-06-04T14:54:33.783000
|
||||
CVE-2025-27038,0,0,fe0578cb45b48dbd7571220d905a674d9df1e67d36609a2b08ca2656fb74b6b8,2025-06-04T17:23:58.387000
|
||||
CVE-2025-2704,0,0,2cd2fdcb7bf078b49adccb5ec3568934eab2cf5655946edca476f7cde559986a,2025-05-24T01:38:01.433000
|
||||
@ -289721,9 +289723,9 @@ CVE-2025-27811,0,0,6df32dd39138756dd7fa6b11625de7738255484a05afc02ff0b73116671b1
|
||||
CVE-2025-27812,0,0,490eea28d11bf4042efca85e606a63ea8705fbb9895bc0e4fb69498d1dff9f35,2025-04-11T15:39:52.920000
|
||||
CVE-2025-27813,0,0,810e9a9403b82aebefac61476a9e0011d443081011347b72d18ecc06e7e5914d,2025-04-11T15:39:52.920000
|
||||
CVE-2025-27816,0,0,9ab27d50becb6f1925043133c65bc558001d86f2d9081231a272e11d17cb2516,2025-03-07T20:15:38.900000
|
||||
CVE-2025-27817,1,1,7dd4c0bd1a46bb395067ed1b44269b1e6f06f079144a4b41be7d2c719bd94ee0,2025-06-10T08:15:22.367000
|
||||
CVE-2025-27818,1,1,42d27206e0aa04dd785d158861e6b931e38e64a728de10e6a627883d7468c48e,2025-06-10T08:15:22.533000
|
||||
CVE-2025-27819,1,1,bbd21378e3e0969ce37ff9bf4077c7ef169d69d769b03d6976946abc183827a2,2025-06-10T08:15:22.687000
|
||||
CVE-2025-27817,0,0,7dd4c0bd1a46bb395067ed1b44269b1e6f06f079144a4b41be7d2c719bd94ee0,2025-06-10T08:15:22.367000
|
||||
CVE-2025-27818,0,0,42d27206e0aa04dd785d158861e6b931e38e64a728de10e6a627883d7468c48e,2025-06-10T08:15:22.533000
|
||||
CVE-2025-27819,0,0,bbd21378e3e0969ce37ff9bf4077c7ef169d69d769b03d6976946abc183827a2,2025-06-10T08:15:22.687000
|
||||
CVE-2025-2782,0,0,f7b2edc498b938674db351470dcc82477b82d7a96a3f89a710e19cd683cf7f7a,2025-04-01T20:26:30.593000
|
||||
CVE-2025-27820,0,0,30e553492644fd74a08595ea9e898b31b3ee3235057c290c91dd23e5320f10ac,2025-05-16T23:15:20.193000
|
||||
CVE-2025-27822,0,0,8db44093401926706a840ce0e19328855573d2443e1e01b57e17b296b11ec387,2025-03-07T22:15:37.927000
|
||||
@ -291415,7 +291417,7 @@ CVE-2025-31116,0,0,dc27938d19edcd1cce30d4459a9fe18b415a789e32b8ab57b4b823d2ab133
|
||||
CVE-2025-31117,0,0,f0c358e12e54ff66d31fcc4e22278028cbeb68331cb3fa3477004c51e39175df,2025-04-30T16:08:43.337000
|
||||
CVE-2025-31118,0,0,8da7d44eafe0503663067ec8d1c233ee1d46933828d48e4543d1ad74f2a2b420,2025-05-13T15:27:06.077000
|
||||
CVE-2025-31119,0,0,8d9ab5def7d45f10e19e138b367b0c6d22067c0f28db2fa5e859ed729d9d01d5,2025-04-07T14:18:34.453000
|
||||
CVE-2025-3112,1,1,bd7d405aca649ec3146442d73241021e418210c7fcc9d2ce417ac895ba40e069,2025-06-10T09:15:23.437000
|
||||
CVE-2025-3112,0,0,bd7d405aca649ec3146442d73241021e418210c7fcc9d2ce417ac895ba40e069,2025-06-10T09:15:23.437000
|
||||
CVE-2025-31120,0,0,bd5940b740e50f8b7e82621062c510c568ad671de0b27daf1d574c8dd878a638,2025-05-13T15:24:49.437000
|
||||
CVE-2025-31121,0,0,0ff275f8523f35ea34ff5d81766304fcf6f1675875b2819d2beeb0b90139b53d,2025-05-07T15:35:41.393000
|
||||
CVE-2025-31122,0,0,9d10a08abcc76e6c9132fba1b31fc54c931fbd5a244a4acba0d835f767d49ffb,2025-04-01T20:26:22.890000
|
||||
@ -291442,14 +291444,14 @@ CVE-2025-31141,0,0,fdf8b65d0398f5604032ea500e1efd4ef3165adf25ebb1cbf6d5791a08d29
|
||||
CVE-2025-31144,0,0,c250fdf328ee74061a9d52a259b43ae4d05dc83889572b3d2df6bcba1de40634,2025-04-29T13:52:10.697000
|
||||
CVE-2025-31147,0,0,b4b9372e5c8a5e40ec0d018e08c7d412a3cd39ffe19cf8f186844b6fcf8ffb0e,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3115,0,0,24a856fe651071984693ab7b99fa6f73c29fbb171f1a48b9abf496d4fc3cc5dc,2025-04-22T16:46:51.650000
|
||||
CVE-2025-3116,1,1,3f08ff586b7d22a9cac95bb1a2842dcb548bf7d56cba2f784cc3c1f6e692e5af,2025-06-10T09:15:23.657000
|
||||
CVE-2025-3116,0,0,3f08ff586b7d22a9cac95bb1a2842dcb548bf7d56cba2f784cc3c1f6e692e5af,2025-06-10T09:15:23.657000
|
||||
CVE-2025-31160,0,0,82f17d7889cbcc07a050e3bd5a0bf584b89c18037b9043c83c638bc1493fe9fc,2025-04-07T01:15:42.477000
|
||||
CVE-2025-31161,0,0,b63c370c3afb95f65e043db6573c233ef54ac00fde0ad33fa5ea3bb2d36c3fab,2025-04-21T21:03:07.753000
|
||||
CVE-2025-31162,0,0,cfeafc9944d79e10529164231b0943be3a87194c4053baabeebe9b961989cbf3,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beebb85,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000
|
||||
CVE-2025-31165,0,0,890d4b71d79960b8670f39224093c3ef99c7f92edd823784cbe3204f4aa998a2,2025-03-27T16:45:27.850000
|
||||
CVE-2025-3117,1,1,e90c4aaa3d506f7805f298702043894715d4e0dcd3b21abaa68d7129e3cd6aa0,2025-06-10T09:15:23.873000
|
||||
CVE-2025-3117,0,0,e90c4aaa3d506f7805f298702043894715d4e0dcd3b21abaa68d7129e3cd6aa0,2025-06-10T09:15:23.873000
|
||||
CVE-2025-31170,0,0,c3da7797f519ed212ad3546b655748de4a071c1dd7a177d6ab90edafcaedfe9b,2025-05-07T20:46:57.603000
|
||||
CVE-2025-31171,0,0,4a534626edebc2023d516705ae4ea70b272964868d24a4e37b00e8d466eedd94,2025-06-06T07:15:25.090000
|
||||
CVE-2025-31172,0,0,90e32b574e57aaae3c88f8457f70e0bd6dfca1d0be15fef48145d614510dc82f,2025-05-07T20:08:51.903000
|
||||
@ -293795,14 +293797,14 @@ CVE-2025-3893,0,0,1ab86d04da56f98bab184b01c702cbbec8f916378a6e5df504f9128fd6b706
|
||||
CVE-2025-3894,0,0,5fc1ef7ab55e4a66950bb4d6ad69ffb2f2004eb936be378e0237154abb754876,2025-05-23T15:54:42.643000
|
||||
CVE-2025-3895,0,0,9d24bc256da3d45e242029d4ef6ca15a30f74d3a742ef680b58f60274e1455ef,2025-05-23T15:54:42.643000
|
||||
CVE-2025-3897,0,0,a76833041004e7ae266165bf906a6eb79929fb700817c1b5afa0458a2a32ab3c,2025-05-12T17:32:32.760000
|
||||
CVE-2025-3898,1,1,62d852c4d043fbcbfe105f82313388052ae5393b13c925a378e0e5fd926cad13,2025-06-10T09:15:24.137000
|
||||
CVE-2025-3899,1,1,86971ea1af781bb77e4d0a800d118a586809ecc465a11006c4a6a82907b13abd,2025-06-10T09:15:24.333000
|
||||
CVE-2025-3898,0,0,62d852c4d043fbcbfe105f82313388052ae5393b13c925a378e0e5fd926cad13,2025-06-10T09:15:24.137000
|
||||
CVE-2025-3899,0,0,86971ea1af781bb77e4d0a800d118a586809ecc465a11006c4a6a82907b13abd,2025-06-10T09:15:24.333000
|
||||
CVE-2025-3900,0,0,0d562be7b180640d1fa0f8676fba7fa2392337449d93ebe74c33a5f4dae11360,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3901,0,0,2ba85ef5f554a9662d34880d6756dc984d3f9d34a1b66af96036fb769e6d7e2b,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3902,0,0,0d69ac5d2bd331eaadcef424ae9ca509a524e67597728ddd5b904c6a193ad755,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3903,0,0,6fd629d73b6d4872a7ffae56d6c3c0b7253c2c832af05b126210d15454d1d4cf,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3904,0,0,a15d72d0f1a0535bebf9df4e01b6cfc45c014de0879ce9d249803945f26fce3b,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3905,1,1,1d661ec7bb97d8c96fffef59b1efed90ddec38d868a38d42a2db62b6d060fb09,2025-06-10T09:15:24.543000
|
||||
CVE-2025-3905,0,0,1d661ec7bb97d8c96fffef59b1efed90ddec38d868a38d42a2db62b6d060fb09,2025-06-10T09:15:24.543000
|
||||
CVE-2025-3906,0,0,7df8181df29dfc516be3edbe2d2bfb26ce2c1c65dc37aa85eebac37ffd9820bc,2025-04-29T13:52:10.697000
|
||||
CVE-2025-3907,0,0,a80de78c9c3d1ebab04e1ed8752735e7a3019c19f3ec8149f3413ad730abea82,2025-04-29T13:52:47.470000
|
||||
CVE-2025-3908,0,0,bea5a1819efe78ab71d639f11ed9041d68358c7880c06e0924fcdfb544a65197,2025-05-21T20:25:33.823000
|
||||
@ -294229,7 +294231,16 @@ CVE-2025-40650,0,0,b06bd04057578be69f52c26cfd738aa4aa83676839010f4d9f35ce7436a21
|
||||
CVE-2025-40651,0,0,1dd3c6768789fd8cb58af27a11d14826bfd53d1b5bf2d2d5309827d197f9e05c,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40652,0,0,3ed1e73ca0af4a402b191efa99599865fb897bbf50a3feb00af29861487f2b95,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40653,0,0,952d6149fd41bb3446d99ef1d9980a07fed39db01b9836f114bc421cd10405d3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40654,1,1,70021833c5d4fccb4cbab7f376b6dbbbb5eeb1659b7238abf2213972c41ec464,2025-06-10T10:15:26.990000
|
||||
CVE-2025-40655,1,1,13fc8c330d3ba042b4fb0ff74338f42d57b0e0f02cdf25fc26d82ac7a7f3d5c3,2025-06-10T10:15:27.620000
|
||||
CVE-2025-40656,1,1,445d56d9e8b8681815d2b427356cf93650e73d35491684b06c257d23b1914704,2025-06-10T10:15:27.843000
|
||||
CVE-2025-40657,1,1,1fdd7fa0fa4630dcad1d0ec16e781e4cf9a241d066312193320c856179404876,2025-06-10T10:15:28.043000
|
||||
CVE-2025-40658,1,1,9e0dd0bf5f4d48d3430e2ac214ac9f11499f92444af36de6b77d763cbd260454,2025-06-10T10:15:28.237000
|
||||
CVE-2025-40659,1,1,5ab65d9a1e9e8fe6f49a660ca7b98dbb76f21ef7918c07bd366a37006d8c05b2,2025-06-10T10:15:28.430000
|
||||
CVE-2025-4066,0,0,6b866ef67faa41ec2689ec4b83aa9ca62c69a8051911732f639e5179e5df1a9e,2025-05-12T19:35:25.097000
|
||||
CVE-2025-40660,1,1,29911c79c9521fcfb5c5e7a057e47c4234cb1dee864fe0c64a3a17305c4c417a,2025-06-10T10:15:28.627000
|
||||
CVE-2025-40661,1,1,0f28040d1797055ea2a2b8beac85a17e088e312b347c25778f9cefcc8d55c4cf,2025-06-10T10:15:28.827000
|
||||
CVE-2025-40662,1,1,2d08d93cd316b56d55652ae4d161fcc5bf4f67c333a3b98aa7ec6815f72b2464,2025-06-10T10:15:29.103000
|
||||
CVE-2025-40663,0,0,4aa8c64bc18f7e33ebb6be208f9cd3156bb0660dc9a760545e0a74283cf88190,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40664,0,0,e366ae4d0edc3020bccb4958e82dfc623d961bfd022fb180a3be2259f2bb55f6,2025-05-28T15:01:30.720000
|
||||
CVE-2025-40665,0,0,80c9d614a0e728f77e8ffb6c772411e08f1a3422b53c0225c9a2a3eda1f363a3,2025-05-28T15:01:30.720000
|
||||
@ -294389,6 +294400,7 @@ CVE-2025-41652,0,0,61b56e820debad0d6ed87e53925b75193550ab4911ec76df587d7530bd8f7
|
||||
CVE-2025-41653,0,0,450cb90166822151ca98533cba100a0f07716a6f9e2e385d8b8766038d4b0cb2,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41654,0,0,c22856a515f49ccd204a32143b656fc257abf14e343863bdec0d026ca010bcd0,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41655,0,0,d4e55c0bf8ee1b4fb7f9a5a70eabfb748935a97fe6cc917be3646a99349642c3,2025-05-28T15:01:30.720000
|
||||
CVE-2025-41657,1,1,fe785a8a271a8bfed9a8574477bebed4f54bcc892e6c96de3103c865106136b3,2025-06-10T11:15:53.150000
|
||||
CVE-2025-4166,0,0,5bfebbee34c2356ee039434bb4ac7a8705ff7fab6fe8d313f7df39c4661cee90,2025-05-05T20:54:45.973000
|
||||
CVE-2025-4168,0,0,a6468df4f7a2597ad76d3cb7aeb08566a4877cfddb2b3e40039e98441ddbce5f,2025-05-05T20:54:19.760000
|
||||
CVE-2025-4169,0,0,bfc728158ddf7f1a565291bbe3bc05c4816fdb9cc64adedded01a1b86d632adf,2025-05-16T14:42:18.700000
|
||||
@ -295451,7 +295463,7 @@ CVE-2025-46782,0,0,190c817e4f3c09faf97df326ed9cdbea1555cc1850d161b9d9da454d08c1d
|
||||
CVE-2025-46785,0,0,37929d48b75dcb8104d52e2202c99878d7f4f635a8670bbd0e6f5af54cd711d3,2025-05-16T14:43:56.797000
|
||||
CVE-2025-46786,0,0,65c9b4d28548a814ac9da85c56a6b20b3ea8dfdc3f7521c8b14e0368cd0ae6bc,2025-05-16T14:43:56.797000
|
||||
CVE-2025-4679,0,0,bd384669d27df6a466ec06c3f367687ccacf0536beef14e450b7ad3bf52b421e,2025-05-30T16:59:38.433000
|
||||
CVE-2025-4680,1,1,04917fb52ac97f3671fa5a524c2313e959c1a69b6f3077d1b477790fd3bd9981,2025-06-10T09:15:24.753000
|
||||
CVE-2025-4680,0,0,04917fb52ac97f3671fa5a524c2313e959c1a69b6f3077d1b477790fd3bd9981,2025-06-10T09:15:24.753000
|
||||
CVE-2025-46801,0,0,11def8e560cfea337e905c8ff57c25c4d9f1a43db749a66daaa006ba67ef4e63,2025-05-19T13:35:20.460000
|
||||
CVE-2025-46802,0,0,e0845e0a2badfb8351bf85ec4dfd1c99c7e29caf4bb332a81fa1375afc25e8ec,2025-05-28T15:01:30.720000
|
||||
CVE-2025-46803,0,0,0a5de4a7042abfff99e6c11ab58d1e1483a67b11f4bef7e11f8857a336030c12,2025-05-28T15:01:30.720000
|
||||
@ -295459,7 +295471,7 @@ CVE-2025-46804,0,0,33150bb68c13eed9accf4cb312a19408b88b9f75691eb7f11163f9cad134f
|
||||
CVE-2025-46805,0,0,b1097088aa0dbd2e4b45c8b3983be6a33e94edc138942af1ff1720f9da99ad58,2025-05-28T15:01:30.720000
|
||||
CVE-2025-46806,0,0,a0ddbfd719345d086b34b9d7a2c69bfbfaed6eb3a3eaf75605585e97e87f5fcb,2025-06-02T17:32:17.397000
|
||||
CVE-2025-46807,0,0,363492342a9bdfb1d61e6eaa455191488139e20c169340caf4edce4ef34cbca1,2025-06-02T17:32:17.397000
|
||||
CVE-2025-4681,1,1,04674e91ef20651e4d9621e9887af179c3465e7bc41acc2bb6c583b7d0e803f2,2025-06-10T09:15:24.933000
|
||||
CVE-2025-4681,0,0,04674e91ef20651e4d9621e9887af179c3465e7bc41acc2bb6c583b7d0e803f2,2025-06-10T09:15:24.933000
|
||||
CVE-2025-46812,0,0,efbba45e18cc8937b9f87a0e29f466265a1e1be9d804a38357596ef0f2987dda,2025-05-12T17:32:52.810000
|
||||
CVE-2025-46813,0,0,01deee0db3f748e6f8e958a47d5a96825a2f5d578da6e58d6d8c34dd9ef7b2a5,2025-05-05T20:54:19.760000
|
||||
CVE-2025-46814,0,0,a39c61eb85c9c40f8b1a1b3b957ff5b21067cc488cde122058f10a18468e916d,2025-05-07T14:13:20.483000
|
||||
@ -297118,10 +297130,10 @@ CVE-2025-5736,0,0,3a3445c9dd8bccb0eab19420a8c3ff563d54017819fff7f9ce75aaae518015
|
||||
CVE-2025-5737,0,0,08daa88b0f47d96d464bb5d9df986f1f88b3c61d0636f7d9794766640f13fa32,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5738,0,0,40160f872c6c36d854905fad1108d58a096f60c1e64b8c34f437851763611290,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5739,0,0,a0de668636e833e77f2e9d40411491def3e08bcb75e4e696079fb6b5aab62971,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5740,1,1,29d7029db250bcbd5771abc037ffd871f9c30fcd9c5af585652c08b614e9861b,2025-06-10T09:15:25.093000
|
||||
CVE-2025-5741,1,1,e07e920074146946e112ca297f361b1e60b188a1abdd71ff1dbdf456dc8bac37,2025-06-10T09:15:25.290000
|
||||
CVE-2025-5742,1,1,a5e49209b2c51ae2aa02947ec521d1e977dd6fe9e1ebc7b2481ad20c87625792,2025-06-10T09:15:25.493000
|
||||
CVE-2025-5743,1,1,0f5a7db666c277c41c19f4c1f8e4208c2e9cbb2dca988861fee4bde592648776,2025-06-10T09:15:25.703000
|
||||
CVE-2025-5740,0,0,29d7029db250bcbd5771abc037ffd871f9c30fcd9c5af585652c08b614e9861b,2025-06-10T09:15:25.093000
|
||||
CVE-2025-5741,0,0,e07e920074146946e112ca297f361b1e60b188a1abdd71ff1dbdf456dc8bac37,2025-06-10T09:15:25.290000
|
||||
CVE-2025-5742,0,0,a5e49209b2c51ae2aa02947ec521d1e977dd6fe9e1ebc7b2481ad20c87625792,2025-06-10T09:15:25.493000
|
||||
CVE-2025-5743,0,0,0f5a7db666c277c41c19f4c1f8e4208c2e9cbb2dca988861fee4bde592648776,2025-06-10T09:15:25.703000
|
||||
CVE-2025-5745,0,0,3580be19c456f8a1a42e4194fda4fe5138a1c28c64f6ee9c28042cef6c57327d,2025-06-06T14:07:28.330000
|
||||
CVE-2025-5747,0,0,bd30b9109ec2b512691e79e8454cb527e5b877dfc8564ef4c3e4be6a95e872d8,2025-06-09T12:15:47.880000
|
||||
CVE-2025-5748,0,0,b761ade174b0cc8fcfa37b7bf22c809e0fbc46ef538ca5441f6bcf38746a2c13,2025-06-09T12:15:47.880000
|
||||
@ -297240,5 +297252,5 @@ CVE-2025-5918,0,0,5fae4533f01b7c4f6585a87e7b2331625bf70aa585af023c3c09519081c4b2
|
||||
CVE-2025-5925,0,0,573daaf55ea018a58bf2bd7e92cad13cf577779f7064f5ad7d1f8de96931b737,2025-06-10T04:15:54.330000
|
||||
CVE-2025-5934,0,0,1ba42daaa63d058bbd118ea21d90f49dd5a949e0cf3049fe0f8f381cc6ec4483,2025-06-10T04:15:55.327000
|
||||
CVE-2025-5935,0,0,bca6b82aff793b09175597d3d76faef10a884937cddad66c78fab2ba223eb2cd,2025-06-10T05:15:22.780000
|
||||
CVE-2025-5945,1,1,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
|
||||
CVE-2025-5945,0,0,c7e4d5fd43d260b09c3d268ba39649757ca6834ec123b67f85c953ef50c7c56d,2025-06-10T09:15:25.930000
|
||||
CVE-2025-5952,0,0,f3a4e649f505b0fd93baf65191971ffe21485a7c802124ab53f303aeb8bcf467,2025-06-10T05:15:23.023000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user