Auto-Update: 2025-07-07T02:00:11.235281+00:00

This commit is contained in:
cad-safe-bot 2025-07-07 02:03:48 +00:00
parent 0de62e8719
commit 4b396fe985
6 changed files with 582 additions and 15 deletions

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7099",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T00:15:22.513",
"lastModified": "2025-07-07T00:15:22.513",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in BoyunCMS up to 1.21 on PHP7 and classified as critical. Affected by this vulnerability is an unknown functionality of the file install/install2.php of the component Installation Handler. The manipulation of the argument db_host leads to deserialization. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.2,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"baseScore": 5.1,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 4.9,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-20"
},
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://note-hxlab.wetolink.com/share/cQGEOmctNARD",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315013",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315013",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604310",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7100",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:22.633",
"lastModified": "2025-07-07T01:15:22.633",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20 and classified as critical. Affected by this issue is some unknown functionality of the file /application/user/controller/Index.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://note-hxlab.wetolink.com/share/KLjaD7oBzCSp",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315014",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315014",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604455",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7101",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:23.450",
"lastModified": "2025-07-07T01:15:23.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20. It has been classified as critical. This affects an unknown part of the file /install/install_ok.php of the component Configuration File Handler. The manipulation of the argument db_pass leads to code injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://note-hxlab.wetolink.com/share/6wemW8CnOMbu",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315015",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315015",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604323",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7102",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-07T01:15:23.637",
"lastModified": "2025-07-07T01:15:23.637",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in BoyunCMS up to 1.4.20. It has been declared as critical. This vulnerability affects unknown code of the file application/update/controller/Server.php. The manipulation of the argument phone leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://note-hxlab.wetolink.com/share/sEjaSsXWRNz1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315016",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315016",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.604401",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-06T23:55:11.064606+00:00
2025-07-07T02:00:11.235281+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-06T23:15:22.143000+00:00
2025-07-07T01:15:23.637000+00:00
```
### Last Data Feed Release
@ -27,24 +27,23 @@ Repository synchronizes with the NVD every 2 hours.
Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/releases/latest)
```plain
2025-07-06T00:00:02.117071+00:00
2025-07-07T00:00:02.113885+00:00
```
### Total Number of included CVEs
```plain
300532
300536
```
### CVEs added in the last Commit
Recently added CVEs: `5`
Recently added CVEs: `4`
- [CVE-2025-3108](CVE-2025/CVE-2025-31xx/CVE-2025-3108.json) (`2025-07-06T23:15:21.777`)
- [CVE-2025-7095](CVE-2025/CVE-2025-70xx/CVE-2025-7095.json) (`2025-07-06T22:15:24.090`)
- [CVE-2025-7096](CVE-2025/CVE-2025-70xx/CVE-2025-7096.json) (`2025-07-06T22:15:25.067`)
- [CVE-2025-7097](CVE-2025/CVE-2025-70xx/CVE-2025-7097.json) (`2025-07-06T23:15:21.960`)
- [CVE-2025-7098](CVE-2025/CVE-2025-70xx/CVE-2025-7098.json) (`2025-07-06T23:15:22.143`)
- [CVE-2025-7099](CVE-2025/CVE-2025-70xx/CVE-2025-7099.json) (`2025-07-07T00:15:22.513`)
- [CVE-2025-7100](CVE-2025/CVE-2025-71xx/CVE-2025-7100.json) (`2025-07-07T01:15:22.633`)
- [CVE-2025-7101](CVE-2025/CVE-2025-71xx/CVE-2025-7101.json) (`2025-07-07T01:15:23.450`)
- [CVE-2025-7102](CVE-2025/CVE-2025-71xx/CVE-2025-7102.json) (`2025-07-07T01:15:23.637`)
### CVEs modified in the last Commit

View File

@ -292134,7 +292134,7 @@ CVE-2025-31076,0,0,828c30720e4eb2dc7f3fc59dc8be6a648b0486905b7a6815532dde47f9d44
CVE-2025-31077,0,0,c356ffd0b74d6893071ca7c0e85e191b532bf96b73b865b26ad16386706925d2,2025-03-28T18:11:40.180000
CVE-2025-31078,0,0,8ce8050616cfd8b7e1e7456f4899c4ba2c4c91fd5c0b1cde5e6134be185d9883,2025-04-02T14:58:07.527000
CVE-2025-31079,0,0,46b384ef015521e190bca84bd2527302238a3f0c98173efde811ff4de494bc17,2025-03-28T18:11:40.180000
CVE-2025-3108,1,1,952f64506d46490adc89d99247bc125004285006ddff55f6753383d4023e0c37,2025-07-06T23:15:21.777000
CVE-2025-3108,0,0,952f64506d46490adc89d99247bc125004285006ddff55f6753383d4023e0c37,2025-07-06T23:15:21.777000
CVE-2025-31080,0,0,f5765755a2ce91b8863099fd7e2de278f04b94c4cc661b8dde775f3360a45794,2025-04-02T14:58:07.527000
CVE-2025-31081,0,0,861fe5a7a8dc08a1e4e9012abea6bfec5e3e656c0b9e13bee20af2af16ce0cfc,2025-04-02T14:58:07.527000
CVE-2025-31082,0,0,9f3db0c988533e5eb16a5d8011e1280a136ca6ff92f3fbb911ddb5a75bbfbb72,2025-04-02T14:58:07.527000
@ -300527,7 +300527,11 @@ CVE-2025-7091,0,0,9ff8a94622a78c987292c304e477b63aa67159cf06a310c5df834c9f14cd4e
CVE-2025-7092,0,0,9038b8e78afac1611ac595ba1203c36b3ed6579074804efcd4d2d855363e18bb,2025-07-06T20:15:24
CVE-2025-7093,0,0,1eb06f226774b5e2ec04482b03278b01077aa16f910ec7d6f9b337b25214f9d8,2025-07-06T21:15:20.830000
CVE-2025-7094,0,0,e2e344ddfd27a95807ccc35b3b92b95a60930aa6693ada5f8dd05ab887987b1d,2025-07-06T21:15:21.727000
CVE-2025-7095,1,1,2ebb72a4715e6eb12d17436eb92184585d7ab98159fab6306429afd4992c3910,2025-07-06T22:15:24.090000
CVE-2025-7096,1,1,9c169e26103bce91b57255a825e068e9f9c54915d639ae83dcd918519a34242e,2025-07-06T22:15:25.067000
CVE-2025-7097,1,1,2255c7655229413ea02dc268292b3acae5030769796cfe1e71eb3ee74f4792de,2025-07-06T23:15:21.960000
CVE-2025-7098,1,1,8f49468278117de1ed5c75fa3637d31ddcf0ca51419c69480ba5fa36e70e3f70,2025-07-06T23:15:22.143000
CVE-2025-7095,0,0,2ebb72a4715e6eb12d17436eb92184585d7ab98159fab6306429afd4992c3910,2025-07-06T22:15:24.090000
CVE-2025-7096,0,0,9c169e26103bce91b57255a825e068e9f9c54915d639ae83dcd918519a34242e,2025-07-06T22:15:25.067000
CVE-2025-7097,0,0,2255c7655229413ea02dc268292b3acae5030769796cfe1e71eb3ee74f4792de,2025-07-06T23:15:21.960000
CVE-2025-7098,0,0,8f49468278117de1ed5c75fa3637d31ddcf0ca51419c69480ba5fa36e70e3f70,2025-07-06T23:15:22.143000
CVE-2025-7099,1,1,87949c56d00cec79cc0373a58db47ba591b2b1b501b545e23abf830cf698df0e,2025-07-07T00:15:22.513000
CVE-2025-7100,1,1,e92939847949ee02dfeb59c915a785450288e223e3f32d0325d95d239ca36e74,2025-07-07T01:15:22.633000
CVE-2025-7101,1,1,d395c3a0fc266fc49eb8cb7fe978a666e991ac39206772e4636794ddb43c8622,2025-07-07T01:15:23.450000
CVE-2025-7102,1,1,dfff2f2f909d1d154a7f5b441a81cf174af9c1013ee6f30af2214c4e00eef044,2025-07-07T01:15:23.637000

Can't render this file because it is too large.