Auto-Update: 2025-07-08T23:55:11.663896+00:00

This commit is contained in:
cad-safe-bot 2025-07-08 23:58:48 +00:00
parent 81926446c5
commit 53d9948a50
49 changed files with 3091 additions and 104 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56468",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-08T23:15:22.840",
"lastModified": "2025-07-08T23:15:22.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM InfoSphere Data Replication VSAM for z/OS Remote Source 11.4 could allow a remote user to cause a denial of service by sending an invalid HTTP request to the log reading service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7239221",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27165",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.107",
"lastModified": "2025-07-08T22:15:24.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27203",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.717",
"lastModified": "2025-07-08T22:15:24.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb25-61.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30313",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.887",
"lastModified": "2025-07-08T22:15:24.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43591",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.050",
"lastModified": "2025-07-08T22:15:25.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43592",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.217",
"lastModified": "2025-07-08T22:15:25.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43594",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.397",
"lastModified": "2025-07-08T22:15:25.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47097",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:23.687",
"lastModified": "2025-07-08T23:15:23.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47098",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:23.850",
"lastModified": "2025-07-08T23:15:23.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47099",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.013",
"lastModified": "2025-07-08T23:15:24.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47103",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.553",
"lastModified": "2025-07-08T22:15:25.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47119",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.173",
"lastModified": "2025-07-08T23:15:24.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47120",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.337",
"lastModified": "2025-07-08T23:15:24.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47121",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.487",
"lastModified": "2025-07-08T23:15:24.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47122",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.640",
"lastModified": "2025-07-08T23:15:24.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47123",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.797",
"lastModified": "2025-07-08T23:15:24.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47124",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.953",
"lastModified": "2025-07-08T23:15:24.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47125",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.117",
"lastModified": "2025-07-08T23:15:25.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47126",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.280",
"lastModified": "2025-07-08T23:15:25.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47127",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.443",
"lastModified": "2025-07-08T23:15:25.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47128",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.593",
"lastModified": "2025-07-08T23:15:25.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47129",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.757",
"lastModified": "2025-07-08T23:15:25.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47130",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.910",
"lastModified": "2025-07-08T23:15:25.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47131",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.073",
"lastModified": "2025-07-08T23:15:26.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47132",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.223",
"lastModified": "2025-07-08T23:15:26.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47133",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.390",
"lastModified": "2025-07-08T23:15:26.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47134",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.703",
"lastModified": "2025-07-08T22:15:25.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47136",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.857",
"lastModified": "2025-07-08T22:15:25.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49524",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.010",
"lastModified": "2025-07-08T22:15:26.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49525",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.183",
"lastModified": "2025-07-08T22:15:26.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49526",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.340",
"lastModified": "2025-07-08T22:15:26.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49527",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.500",
"lastModified": "2025-07-08T22:15:26.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49528",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.657",
"lastModified": "2025-07-08T22:15:26.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49529",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.810",
"lastModified": "2025-07-08T22:15:26.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49530",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.960",
"lastModified": "2025-07-08T22:15:26.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49531",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.113",
"lastModified": "2025-07-08T22:15:27.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49532",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.273",
"lastModified": "2025-07-08T22:15:27.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49533",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.423",
"lastModified": "2025-07-08T22:15:27.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49534",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.587",
"lastModified": "2025-07-08T22:15:27.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49547",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.737",
"lastModified": "2025-07-08T22:15:27.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-53547",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-08T22:15:27.897",
"lastModified": "2025-07-08T22:15:27.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-6550",
"sourceIdentifier": "security@wordfence.com",
"published": "2025-06-27T08:15:23.053",
"lastModified": "2025-07-07T15:38:38.413",
"vulnStatus": "Analyzed",
"lastModified": "2025-07-08T22:15:28.053",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
"value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
},
{
"lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [
{
"source": "security@wordfence.com",
"type": "Primary",
"type": "Secondary",
"description": [
{
"lang": "en",
@ -132,6 +132,14 @@
"Product"
]
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3320280/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3321887/",
"source": "security@wordfence.com"
},
{
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af2f136-5806-4d5e-a72d-486c4839a695?source=cve",
"source": "security@wordfence.com",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-6759",
"sourceIdentifier": "secure@citrix.com",
"published": "2025-07-08T22:15:28.213",
"lastModified": "2025-07-08T22:15:28.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in Windows Virtual Delivery Agent for CVAD and Citrix DaaS"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820",
"source": "secure@citrix.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7197",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T22:15:28.363",
"lastModified": "2025-07-08T22:15:28.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/18889016001/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607819",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7198",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T22:15:28.563",
"lastModified": "2025-07-08T22:15:28.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Jonnys Liquor 1.0. This vulnerability affects unknown code of the file /admin/admin-area.php. The manipulation of the argument drink leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/18889016001/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607820",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T23:15:26.547",
"lastModified": "2025-07-08T23:15:26.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Library System 1.0. This issue affects some unknown processing of the file /notapprove.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Gemileo/CVE/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315137",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315137",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607470",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7200",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T23:15:26.757",
"lastModified": "2025-07-08T23:15:26.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in krishna9772 Pharmacy Management System up to a2efc8442931ec9308f3b4cf4778e5701153f4e5. Affected is an unknown function of the file quantity_upd.php. The manipulation of the argument med_name/med_cat/ex_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/horytick/CVE/blob/main/SQL%20Injection%20Vulnerability%20in%20Pharmacy%20Management%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315138",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315138",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607526",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-07-08T22:00:12.613889+00:00
2025-07-08T23:55:11.663896+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-07-08T21:15:29.963000+00:00
2025-07-08T23:15:26.757000+00:00
```
### Last Data Feed Release
@ -33,66 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
301104
301150
```
### CVEs added in the last Commit
Recently added CVEs: `24`
Recently added CVEs: `46`
- [CVE-2025-37103](CVE-2025/CVE-2025-371xx/CVE-2025-37103.json) (`2025-07-08T20:15:26.033`)
- [CVE-2025-43582](CVE-2025/CVE-2025-435xx/CVE-2025-43582.json) (`2025-07-08T21:15:25.387`)
- [CVE-2025-43583](CVE-2025/CVE-2025-435xx/CVE-2025-43583.json) (`2025-07-08T21:15:25.543`)
- [CVE-2025-43584](CVE-2025/CVE-2025-435xx/CVE-2025-43584.json) (`2025-07-08T21:15:25.690`)
- [CVE-2025-49535](CVE-2025/CVE-2025-495xx/CVE-2025-49535.json) (`2025-07-08T21:15:26.113`)
- [CVE-2025-49536](CVE-2025/CVE-2025-495xx/CVE-2025-49536.json) (`2025-07-08T21:15:26.280`)
- [CVE-2025-49537](CVE-2025/CVE-2025-495xx/CVE-2025-49537.json) (`2025-07-08T21:15:26.437`)
- [CVE-2025-49538](CVE-2025/CVE-2025-495xx/CVE-2025-49538.json) (`2025-07-08T21:15:26.597`)
- [CVE-2025-49539](CVE-2025/CVE-2025-495xx/CVE-2025-49539.json) (`2025-07-08T21:15:26.757`)
- [CVE-2025-49540](CVE-2025/CVE-2025-495xx/CVE-2025-49540.json) (`2025-07-08T21:15:26.907`)
- [CVE-2025-49541](CVE-2025/CVE-2025-495xx/CVE-2025-49541.json) (`2025-07-08T21:15:27.060`)
- [CVE-2025-49542](CVE-2025/CVE-2025-495xx/CVE-2025-49542.json) (`2025-07-08T21:15:27.213`)
- [CVE-2025-49543](CVE-2025/CVE-2025-495xx/CVE-2025-49543.json) (`2025-07-08T21:15:27.360`)
- [CVE-2025-49544](CVE-2025/CVE-2025-495xx/CVE-2025-49544.json) (`2025-07-08T21:15:27.520`)
- [CVE-2025-49545](CVE-2025/CVE-2025-495xx/CVE-2025-49545.json) (`2025-07-08T21:15:27.670`)
- [CVE-2025-49546](CVE-2025/CVE-2025-495xx/CVE-2025-49546.json) (`2025-07-08T21:15:27.820`)
- [CVE-2025-49551](CVE-2025/CVE-2025-495xx/CVE-2025-49551.json) (`2025-07-08T21:15:27.970`)
- [CVE-2025-53355](CVE-2025/CVE-2025-533xx/CVE-2025-53355.json) (`2025-07-08T20:15:30.020`)
- [CVE-2025-7030](CVE-2025/CVE-2025-70xx/CVE-2025-7030.json) (`2025-07-08T21:15:28.773`)
- [CVE-2025-7031](CVE-2025/CVE-2025-70xx/CVE-2025-7031.json) (`2025-07-08T21:15:28.907`)
- [CVE-2025-7192](CVE-2025/CVE-2025-71xx/CVE-2025-7192.json) (`2025-07-08T20:15:30.830`)
- [CVE-2025-7193](CVE-2025/CVE-2025-71xx/CVE-2025-7193.json) (`2025-07-08T20:15:31.040`)
- [CVE-2025-7194](CVE-2025/CVE-2025-71xx/CVE-2025-7194.json) (`2025-07-08T21:15:29.763`)
- [CVE-2025-7196](CVE-2025/CVE-2025-71xx/CVE-2025-7196.json) (`2025-07-08T21:15:29.963`)
- [CVE-2025-47129](CVE-2025/CVE-2025-471xx/CVE-2025-47129.json) (`2025-07-08T23:15:25.757`)
- [CVE-2025-47130](CVE-2025/CVE-2025-471xx/CVE-2025-47130.json) (`2025-07-08T23:15:25.910`)
- [CVE-2025-47131](CVE-2025/CVE-2025-471xx/CVE-2025-47131.json) (`2025-07-08T23:15:26.073`)
- [CVE-2025-47132](CVE-2025/CVE-2025-471xx/CVE-2025-47132.json) (`2025-07-08T23:15:26.223`)
- [CVE-2025-47133](CVE-2025/CVE-2025-471xx/CVE-2025-47133.json) (`2025-07-08T23:15:26.390`)
- [CVE-2025-47134](CVE-2025/CVE-2025-471xx/CVE-2025-47134.json) (`2025-07-08T22:15:25.703`)
- [CVE-2025-47136](CVE-2025/CVE-2025-471xx/CVE-2025-47136.json) (`2025-07-08T22:15:25.857`)
- [CVE-2025-49524](CVE-2025/CVE-2025-495xx/CVE-2025-49524.json) (`2025-07-08T22:15:26.010`)
- [CVE-2025-49525](CVE-2025/CVE-2025-495xx/CVE-2025-49525.json) (`2025-07-08T22:15:26.183`)
- [CVE-2025-49526](CVE-2025/CVE-2025-495xx/CVE-2025-49526.json) (`2025-07-08T22:15:26.340`)
- [CVE-2025-49527](CVE-2025/CVE-2025-495xx/CVE-2025-49527.json) (`2025-07-08T22:15:26.500`)
- [CVE-2025-49528](CVE-2025/CVE-2025-495xx/CVE-2025-49528.json) (`2025-07-08T22:15:26.657`)
- [CVE-2025-49529](CVE-2025/CVE-2025-495xx/CVE-2025-49529.json) (`2025-07-08T22:15:26.810`)
- [CVE-2025-49530](CVE-2025/CVE-2025-495xx/CVE-2025-49530.json) (`2025-07-08T22:15:26.960`)
- [CVE-2025-49531](CVE-2025/CVE-2025-495xx/CVE-2025-49531.json) (`2025-07-08T22:15:27.113`)
- [CVE-2025-49532](CVE-2025/CVE-2025-495xx/CVE-2025-49532.json) (`2025-07-08T22:15:27.273`)
- [CVE-2025-49533](CVE-2025/CVE-2025-495xx/CVE-2025-49533.json) (`2025-07-08T22:15:27.423`)
- [CVE-2025-49534](CVE-2025/CVE-2025-495xx/CVE-2025-49534.json) (`2025-07-08T22:15:27.587`)
- [CVE-2025-49547](CVE-2025/CVE-2025-495xx/CVE-2025-49547.json) (`2025-07-08T22:15:27.737`)
- [CVE-2025-53547](CVE-2025/CVE-2025-535xx/CVE-2025-53547.json) (`2025-07-08T22:15:27.897`)
- [CVE-2025-6759](CVE-2025/CVE-2025-67xx/CVE-2025-6759.json) (`2025-07-08T22:15:28.213`)
- [CVE-2025-7197](CVE-2025/CVE-2025-71xx/CVE-2025-7197.json) (`2025-07-08T22:15:28.363`)
- [CVE-2025-7198](CVE-2025/CVE-2025-71xx/CVE-2025-7198.json) (`2025-07-08T22:15:28.563`)
- [CVE-2025-7199](CVE-2025/CVE-2025-71xx/CVE-2025-7199.json) (`2025-07-08T23:15:26.547`)
- [CVE-2025-7200](CVE-2025/CVE-2025-72xx/CVE-2025-7200.json) (`2025-07-08T23:15:26.757`)
### CVEs modified in the last Commit
Recently modified CVEs: `23`
Recently modified CVEs: `1`
- [CVE-2020-1171](CVE-2020/CVE-2020-11xx/CVE-2020-1171.json) (`2025-07-08T20:03:48.173`)
- [CVE-2020-1192](CVE-2020/CVE-2020-11xx/CVE-2020-1192.json) (`2025-07-08T20:03:48.173`)
- [CVE-2024-35144](CVE-2024/CVE-2024-351xx/CVE-2024-35144.json) (`2025-07-08T20:29:44.110`)
- [CVE-2024-35145](CVE-2024/CVE-2024-351xx/CVE-2024-35145.json) (`2025-07-08T20:29:30.803`)
- [CVE-2024-35146](CVE-2024/CVE-2024-351xx/CVE-2024-35146.json) (`2025-07-08T20:29:54.267`)
- [CVE-2024-35148](CVE-2024/CVE-2024-351xx/CVE-2024-35148.json) (`2025-07-08T20:27:05.503`)
- [CVE-2024-35150](CVE-2024/CVE-2024-351xx/CVE-2024-35150.json) (`2025-07-08T20:22:34.600`)
- [CVE-2025-0158](CVE-2025/CVE-2025-01xx/CVE-2025-0158.json) (`2025-07-08T20:06:15.347`)
- [CVE-2025-0759](CVE-2025/CVE-2025-07xx/CVE-2025-0759.json) (`2025-07-08T20:05:43.337`)
- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-07-08T20:14:36.577`)
- [CVE-2025-29267](CVE-2025/CVE-2025-292xx/CVE-2025-29267.json) (`2025-07-08T21:15:24.580`)
- [CVE-2025-31022](CVE-2025/CVE-2025-310xx/CVE-2025-31022.json) (`2025-07-08T20:15:25.710`)
- [CVE-2025-37102](CVE-2025/CVE-2025-371xx/CVE-2025-37102.json) (`2025-07-08T20:15:25.900`)
- [CVE-2025-47422](CVE-2025/CVE-2025-474xx/CVE-2025-47422.json) (`2025-07-08T21:15:25.947`)
- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-07-08T20:35:15.717`)
- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-07-08T20:34:54.967`)
- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-07-08T20:35:27.190`)
- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-07-08T20:35:36.687`)
- [CVE-2025-53480](CVE-2025/CVE-2025-534xx/CVE-2025-53480.json) (`2025-07-08T21:15:28.227`)
- [CVE-2025-53495](CVE-2025/CVE-2025-534xx/CVE-2025-53495.json) (`2025-07-08T20:15:30.183`)
- [CVE-2025-53496](CVE-2025/CVE-2025-534xx/CVE-2025-53496.json) (`2025-07-08T20:15:30.430`)
- [CVE-2025-53498](CVE-2025/CVE-2025-534xx/CVE-2025-53498.json) (`2025-07-08T21:15:28.380`)
- [CVE-2025-53499](CVE-2025/CVE-2025-534xx/CVE-2025-53499.json) (`2025-07-08T20:15:30.623`)
- [CVE-2025-6550](CVE-2025/CVE-2025-65xx/CVE-2025-6550.json) (`2025-07-08T22:15:28.053`)
## Download and Usage

View File

@ -146933,7 +146933,7 @@ CVE-2020-11706,0,0,eeb8b638cf071245d8e93f3342f14ca45f3d2e4a2e7a21ed1fbde0b2d8007
CVE-2020-11707,0,0,db51c5eee738c62c43b8709f5d6b70925efb3e350231121ab8f26f9ebc6a1536,2024-11-21T04:58:26.883000
CVE-2020-11708,0,0,b5ddea211cc308f025c496f1c9162a7ce419e37388999e4c540d9fccfa3032d5,2024-11-21T04:58:27.020000
CVE-2020-11709,0,0,b76b211e9d44f50570ba99ce7aa237753934914dac0fe2eb13fb806b4ae9541b,2024-11-21T04:58:27.163000
CVE-2020-1171,0,1,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000
CVE-2020-1171,0,0,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000
CVE-2020-11710,0,0,0c881cb09aeff05a93a0b94dd8ba9913197a5ad156c9209bc4fdded71a2e1e29,2024-11-21T04:58:27.307000
CVE-2020-11711,0,0,f4106594acdf7e44ec44e6feabc08da09474b12d7322251671f1a20600de3f46,2024-11-21T04:58:27.460000
CVE-2020-11712,0,0,9e2cb49800083b936e9e71815a929f166c3eb08584dd8b1dfaa2e54aada3a68a,2024-11-21T04:58:27.617000
@ -147140,7 +147140,7 @@ CVE-2020-11916,0,0,b030395624f14d3ddfb34e8361472323e30df1a28f655a305ea4e251b2e59
CVE-2020-11917,0,0,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000
CVE-2020-11918,0,0,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000
CVE-2020-11919,0,0,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000
CVE-2020-1192,0,1,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000
CVE-2020-1192,0,0,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000
CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000
CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000
CVE-2020-11922,0,0,34dee0addcbefd37e031f6dbedb5ad1741ebc2710364aac63adc194527b15f99,2024-11-21T04:58:54.733000
@ -261859,12 +261859,12 @@ CVE-2024-35140,0,0,dcb39679630ddcaef3b6511185b27681ac1153141e804705769f97c9da434
CVE-2024-35141,0,0,3e97d4328bde3a3960ec1e8a98391f50d1264f252049e70e215d2b003d7be7ab,2025-01-29T21:00:00.257000
CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000
CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000
CVE-2024-35144,0,1,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000
CVE-2024-35145,0,1,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000
CVE-2024-35146,0,1,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000
CVE-2024-35148,0,1,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000
CVE-2024-35144,0,0,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000
CVE-2024-35145,0,0,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000
CVE-2024-35146,0,0,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000
CVE-2024-35148,0,0,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000
CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000
CVE-2024-35150,0,1,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000
CVE-2024-35150,0,0,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000
CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000
CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000
CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000
@ -277792,6 +277792,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d
CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000
CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000
CVE-2024-56467,0,0,a637c2bcf3b6a4a4b3f08718b44e1be4e289aad16c95ae9f9eab032a86fca295,2025-07-07T18:26:35.707000
CVE-2024-56468,1,1,ff714809f0017608b02b1568a755730d7355f8721e1ec2e84d6131947b4e0bc8,2025-07-08T23:15:22.840000
CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000
CVE-2024-5647,0,0,ab8dda8bbe1d15e33baced30b68dc6602e623ee999011776cef9f579e77b11cf,2025-07-03T15:13:53.147000
CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000
@ -282983,7 +282984,7 @@ CVE-2025-0149,0,0,c862a88db319c8eef1ca91fc74c77e313cc2ee14a94c70931d8815bb3a5c42
CVE-2025-0150,0,0,dca63b1abf1123a886706c853958072be5044d1c9ef23070ccdaffe267aedd34,2025-03-11T18:15:29.800000
CVE-2025-0151,0,0,ee31fb3c9dd590238f179f6f3a56f394ab47d251029c9adfaeba4c64aca0174c,2025-03-11T18:15:29.940000
CVE-2025-0154,0,0,50cc7e4c9f2877c13739ab14af2e76b9d150968a2d961bf547c3aad04539fac0,2025-04-07T14:18:49.830000
CVE-2025-0158,0,1,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000
CVE-2025-0158,0,0,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000
CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000
CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
@ -283476,7 +283477,7 @@ CVE-2025-0755,0,0,6d0dbadfda4a802c88ca940e4a533e59c6edc3de28616d86b3c764f16adc71
CVE-2025-0756,0,0,2f503184d01f58f956cb3d61accff5238661a48ad3360193623bab7de05b60ea,2025-04-17T20:21:48.243000
CVE-2025-0757,0,0,28a402bbfb840751157b78e725c0bb0f7484cb6d9360d77a653a5b5f45018749,2025-04-17T20:21:48.243000
CVE-2025-0758,0,0,727f4ea3aa4edd214a32da546eaa17a87b0da516ccecd5a176ebefb6a6f5ee34,2025-04-17T20:21:48.243000
CVE-2025-0759,0,1,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000
CVE-2025-0759,0,0,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
CVE-2025-0762,0,0,03f57ccaa8cea227bf85d5172a4940cc05d8a50f3c1e62b0d5c2821514db1a51,2025-04-21T20:53:55.553000
CVE-2025-0764,0,0,77273f85eebda75df5c1b10c7e10eb8fa4db2d37828ed49e781e9b7366818024,2025-03-06T17:57:14.677000
@ -284083,7 +284084,7 @@ CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d445
CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000
CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000
CVE-2025-1499,0,0,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000
CVE-2025-1500,0,1,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000
CVE-2025-1500,0,0,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000
CVE-2025-1504,0,0,0e09d380d5124abfd6e1c49748bbac5d04454a770e81e97825f6db7a4e571c1f,2025-03-24T18:27:10.747000
@ -289954,6 +289955,7 @@ CVE-2025-27161,0,0,e2daf6461b200bca09da7de40a88d9c467451fb23187bd82948c062f9b5be
CVE-2025-27162,0,0,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000
CVE-2025-27163,0,0,81f9699e5b11ea3842ffe9245801daecdb91eec74b0663ccf8976a83a7348e35,2025-04-28T16:48:36.780000
CVE-2025-27164,0,0,1e629a8207bea42d1358f357512432dc28b249a65ee22a83932b7b9ee7da9dde,2025-04-28T16:48:33.017000
CVE-2025-27165,1,1,155ef390f669d6468b0102ed2c72d4380689dc4db0ed799a4f6608e79cc30933,2025-07-08T22:15:24.107000
CVE-2025-27166,0,0,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000
CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000
CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000
@ -289995,6 +289997,7 @@ CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12c
CVE-2025-27200,0,0,2d55459379d67dca2d0eb314eb2150af648e2a6572b027ee78112b380b949b64,2025-04-18T14:40:40.313000
CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000
CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000
CVE-2025-27203,1,1,4ac4588eba67d8607f05965f50eae40867fdeefa38cdc1f8b334d6ea289cf222,2025-07-08T22:15:24.717000
CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000
CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000
CVE-2025-27206,0,0,d294d50f3906c6fb3fe785cd1596aadcf69ed2db2162953cfc8dc1288ebf1c78,2025-06-23T19:25:38.097000
@ -291001,7 +291004,7 @@ CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c
CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000
CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000
CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000
CVE-2025-29267,0,1,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000
CVE-2025-29267,0,0,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000
CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000
CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000
@ -291544,6 +291547,7 @@ CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f734799450
CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000
CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000
CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000
CVE-2025-30313,1,1,6fe792e37fa789df49a338e7f0e30726bb6c2367c67fc5969480fd4a5fd962ce,2025-07-08T22:15:24.887000
CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000
CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000
CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000
@ -292202,7 +292206,7 @@ CVE-2025-31019,0,0,0ce2758b0a8e888aab73b46b8932e361c63f6d92aba8710ee3abf24f3437a
CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000
CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000
CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000
CVE-2025-31022,0,1,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000
CVE-2025-31022,0,0,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000
CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000
CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000
CVE-2025-31025,0,0,053527fbe27001f119a974095c520ba6e0ed6e07579def4bdb1aa3af4361283c,2025-06-06T14:06:58.193000
@ -294464,8 +294468,8 @@ CVE-2025-37099,0,0,067e991498d8cba31dd0ba2256a8ecf23acb321ae5ac75f861fdab474706e
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
CVE-2025-37100,0,0,88b9ad7c7695f3a4670adb22647dcc8cbf099c03d5439646676dc63333e683a5,2025-06-12T16:06:39.330000
CVE-2025-37101,0,0,611db152f3bf6fbbe88c02a9c7c1f7f719963d9f48f127e010121dc26484aa06,2025-06-26T18:57:43.670000
CVE-2025-37102,0,1,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000
CVE-2025-37103,1,1,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000
CVE-2025-37102,0,0,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000
CVE-2025-37103,0,0,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
@ -296099,9 +296103,9 @@ CVE-2025-43579,0,0,7eef94019923cdf7523c797919be9d42cfebb3f84c4aac09a8b6180f71a5f
CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000
CVE-2025-43580,0,0,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000
CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000
CVE-2025-43582,1,1,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000
CVE-2025-43583,1,1,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000
CVE-2025-43584,1,1,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000
CVE-2025-43582,0,0,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000
CVE-2025-43583,0,0,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000
CVE-2025-43584,0,0,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000
CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000
CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000
CVE-2025-43587,0,0,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000
@ -296109,7 +296113,10 @@ CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6d
CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
CVE-2025-43591,1,1,6830c3e0d4762c9c103fc4598fee898be639970882dd0b7f06260439773a20ac,2025-07-08T22:15:25.050000
CVE-2025-43592,1,1,467a87e9b3d77fb41c1440a2b0fddf6ff8c9a732f7fd4c67296c7026a8b240d0,2025-07-08T22:15:25.217000
CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
CVE-2025-43594,1,1,648b3f694ce768ed9e4c2e3618b18b5cc3b87284168846e836a5c621bf849db3,2025-07-08T22:15:25.397000
CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000
CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000
CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000
@ -297335,8 +297342,12 @@ CVE-2025-47093,0,0,d041bb92bf35803d912e46cc3786fe6194a9f70224953010e6cfbbb689495
CVE-2025-47094,0,0,2b1e141c81f037a004986a2a6feda2400217e4605e2e7cbf768fa440e99bdb14,2025-06-16T14:47:48.470000
CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673a42,2025-06-11T00:15:27.457000
CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000
CVE-2025-47097,1,1,a32b4216bd3ba5587e5a8fb6bc2b5ce1dc4b740ce18afbf9eefdd622686b418f,2025-07-08T23:15:23.687000
CVE-2025-47098,1,1,e07334de3d0b5e6f86633570d8041dc6af3c394211803325d190792c71bf7349,2025-07-08T23:15:23.850000
CVE-2025-47099,1,1,ffb43766404e7cd47c3534f5792f8695dde3e0c2a232f081041fbec936aa6e9a,2025-07-08T23:15:24.013000
CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000
CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000
CVE-2025-47103,1,1,0f958201632760b4bb1e0a74fe0514cd2c2c24ff9fae758401712bc4feb220f1,2025-07-08T22:15:25.553000
CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
@ -297352,9 +297363,26 @@ CVE-2025-47114,0,0,d163492e89575318359525e72632c9c943e0e758e06a293f69c2dae9facfa
CVE-2025-47115,0,0,1bbfc8222a0849d3f615770e73bae226a0c8265c4bce8e1cd9a585d4ca4685bc,2025-06-16T14:47:31.267000
CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac507,2025-06-16T14:47:27.360000
CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000
CVE-2025-47119,1,1,f0c8fd41e81c88d1be07c0092de74bc846c65420be78c31a437a33493dfc2c19,2025-07-08T23:15:24.173000
CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000
CVE-2025-47120,1,1,2867370570756813db7eb03adca268c3b4b39beb4e965ed18aa045454643cdb8,2025-07-08T23:15:24.337000
CVE-2025-47121,1,1,95929ef04ae37891c67ec941c0f1bdc68a55462f6f04ae4c9d7480897241edef,2025-07-08T23:15:24.487000
CVE-2025-47122,1,1,bc428eaaea677bf9f4191c6c900cfa0ec6aeca3bd6b744bdbda6b22fdaf1813b,2025-07-08T23:15:24.640000
CVE-2025-47123,1,1,149447a8d580ca6b8001eacc5c19def615fc1b3c0e12a79544af06138d927b01,2025-07-08T23:15:24.797000
CVE-2025-47124,1,1,2149c33e8d18c41701e1486795e64efec9f9a70061ecfc8ea77bcd7ae7ce0efe,2025-07-08T23:15:24.953000
CVE-2025-47125,1,1,df5fd29003f5ab9e7a945de707a95a6a022032c0606e4f254098df45e3106891,2025-07-08T23:15:25.117000
CVE-2025-47126,1,1,f6795b756fc831284dc88431ce3ead81a771ae3353bb117ba86a4d5eb30432e4,2025-07-08T23:15:25.280000
CVE-2025-47127,1,1,b4f61c867c13bed502ebf00cc063fc2ebbd2d6f10461d4efb4ffb8602c85cad4,2025-07-08T23:15:25.443000
CVE-2025-47128,1,1,611731a0747ad4703b5d747b06c39f1f3db635f3b11ed6538df8b7c543242e3b,2025-07-08T23:15:25.593000
CVE-2025-47129,1,1,e277e77d0c0c2b7c545a2d102ffa357116182e6b57b9b6154b9277fc7af8805b,2025-07-08T23:15:25.757000
CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000
CVE-2025-47130,1,1,80f775b176e0eec4c95abb50abc91cde6c7e1e969f05fc7b5dedaf530f78fdc9,2025-07-08T23:15:25.910000
CVE-2025-47131,1,1,025bd12695c59650091129dd599a7865168286a4f306798e3c71b00fea30ee17,2025-07-08T23:15:26.073000
CVE-2025-47132,1,1,ad5b20a6a03e2421e916bacae6c502b98cf21b20c97c7f22f6ca631de66efd15,2025-07-08T23:15:26.223000
CVE-2025-47133,1,1,960d61abfd9e907b69fe6e9fe40a3328a119e9f5e7b5ec858013b61e6b9860d0,2025-07-08T23:15:26.390000
CVE-2025-47134,1,1,bfd73800cd1b3d75d725db349716aaa75033a2ff8f0d93841f81712003f3d4c0,2025-07-08T22:15:25.703000
CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000
CVE-2025-47136,1,1,fd3c0672f300fcfaca803a507eed7620af44dc5f993b80653c0e8134a3dfcf86,2025-07-08T22:15:25.857000
CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000
CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000
CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000
@ -297458,7 +297486,7 @@ CVE-2025-47418,0,0,bdeebdcffdfcfa25a9c3fca2d88b0ef86304dd2bce949cfa926a70785bd61
CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000
CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000
CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000
CVE-2025-47422,0,1,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000
CVE-2025-47422,0,0,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000
CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000
CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000
CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000
@ -298364,11 +298392,11 @@ CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec72
CVE-2025-48914,0,0,da6bad0c4d0e6121a9d50700e2fc20599407401d3911e3bb2477eba8adbe7eea,2025-06-18T15:57:07.227000
CVE-2025-48915,0,0,d0d154b27b6b38bf355906ab2c27cbf671e5447a4489ef6508823c1eb32aeead,2025-06-18T15:57:25.617000
CVE-2025-48916,0,0,064370efde96850d30de939e26f598a08846fb12f52793745ff31da22fd4e34e,2025-06-16T12:32:18.840000
CVE-2025-48917,0,1,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000
CVE-2025-48918,0,1,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000
CVE-2025-48919,0,1,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000
CVE-2025-48917,0,0,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000
CVE-2025-48918,0,0,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000
CVE-2025-48919,0,0,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
CVE-2025-48920,0,1,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000
CVE-2025-48920,0,0,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000
CVE-2025-48921,0,0,bf8abbd438522ab19b03d1fef94a34f38eef0e3ce6985bd31edb7d679cf6c776,2025-06-26T18:57:43.670000
CVE-2025-48922,0,0,5a39c3a2314efaec349abc0bfa7dca0f34477df009f53b13f84a3980bc0a5a03,2025-06-26T18:57:43.670000
CVE-2025-48923,0,0,1b4953164a87b46a282bdab4066b15729f967660cf7b30e28abeb78958c86467,2025-06-26T18:57:43.670000
@ -298739,23 +298767,35 @@ CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0d
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000
CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000
CVE-2025-49535,1,1,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000
CVE-2025-49536,1,1,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000
CVE-2025-49537,1,1,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000
CVE-2025-49538,1,1,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000
CVE-2025-49539,1,1,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000
CVE-2025-49524,1,1,cf0534c507f7c5f47e05216df0397a22f256128f09d71caca35014be7037ec6d,2025-07-08T22:15:26.010000
CVE-2025-49525,1,1,c043b565919129e48845c4164bc9fa3614b7d316f768d685dfd4ef1ea55eb1cc,2025-07-08T22:15:26.183000
CVE-2025-49526,1,1,d9c6502c00f943f1d4ed6e7a11c47e0cdd69ba38c45e1c33442d9c9d0106560f,2025-07-08T22:15:26.340000
CVE-2025-49527,1,1,0f96b6fe097a0e4a381adcc29941fd8e306ba564f7a3cbb4eb989c540f66e1a9,2025-07-08T22:15:26.500000
CVE-2025-49528,1,1,c04d3258f8d6e7db1cf2d51a6a086de82dab581ba8e198e5e5036134288e141a,2025-07-08T22:15:26.657000
CVE-2025-49529,1,1,6c9158651c8d6f73f11c9fb70b3f2c1abba0d1b38edecc4c755cccbb6d93abb6,2025-07-08T22:15:26.810000
CVE-2025-49530,1,1,957bf34b474fba5de280895f12e0abfd24e823b5bfc9e19f5f13dd3aaede4674,2025-07-08T22:15:26.960000
CVE-2025-49531,1,1,321058713aac28893cebf8dd55502a6ac06a3eecb9af13ea3373ffa95c1dfbdc,2025-07-08T22:15:27.113000
CVE-2025-49532,1,1,395fe09750e5ab0de85f88a8bb0d7ddcacff97a4e91645ba5dd12d1822e76bb0,2025-07-08T22:15:27.273000
CVE-2025-49533,1,1,23d6b9fdd252390f8881e6f53f2b7cb4ede566acad453771a83c56bc08c8bfd1,2025-07-08T22:15:27.423000
CVE-2025-49534,1,1,88b71a5cc34e50c8fd5a55773bd40159fc244c03ace46b3b6241795308bce314,2025-07-08T22:15:27.587000
CVE-2025-49535,0,0,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000
CVE-2025-49536,0,0,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000
CVE-2025-49537,0,0,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000
CVE-2025-49538,0,0,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000
CVE-2025-49539,0,0,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000
CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000
CVE-2025-49540,1,1,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000
CVE-2025-49541,1,1,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000
CVE-2025-49542,1,1,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000
CVE-2025-49543,1,1,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000
CVE-2025-49544,1,1,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000
CVE-2025-49545,1,1,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000
CVE-2025-49546,1,1,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000
CVE-2025-49540,0,0,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000
CVE-2025-49541,0,0,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000
CVE-2025-49542,0,0,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000
CVE-2025-49543,0,0,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000
CVE-2025-49544,0,0,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000
CVE-2025-49545,0,0,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000
CVE-2025-49546,0,0,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000
CVE-2025-49547,1,1,9f057608fd5bded1b3e3d881b8d5b33b5948ad193dc915409d3273384c3360a2,2025-07-08T22:15:27.737000
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000
CVE-2025-49551,1,1,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000
CVE-2025-49551,0,0,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000
CVE-2025-49574,0,0,ec211dbe5543652a4df81f232ea6a683a4d467fc93142407aa7003d8d8ff4016,2025-06-23T20:16:21.633000
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000
@ -299665,7 +299705,7 @@ CVE-2025-53338,0,0,69ee0c5b640fcd72e43f5a3a6d7505b4ccd5499b6d733162f15f39655cb80
CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000
CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000
CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000
CVE-2025-53355,1,1,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000
CVE-2025-53355,0,0,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
@ -299703,7 +299743,7 @@ CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29a
CVE-2025-53473,0,0,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000
CVE-2025-53478,0,0,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000
CVE-2025-53479,0,0,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000
CVE-2025-53480,0,1,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000
CVE-2025-53480,0,0,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000
CVE-2025-53481,0,0,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000
CVE-2025-53482,0,0,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000
CVE-2025-53483,0,0,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000
@ -299719,11 +299759,11 @@ CVE-2025-53491,0,0,6b3662c2831fdd8c79ded4454ee2035fa60f94a03054090afb7fd7e68c185
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
CVE-2025-53495,0,1,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000
CVE-2025-53496,0,1,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000
CVE-2025-53495,0,0,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000
CVE-2025-53496,0,0,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000
CVE-2025-53497,0,0,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000
CVE-2025-53498,0,1,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000
CVE-2025-53499,0,1,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000
CVE-2025-53498,0,0,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000
CVE-2025-53499,0,0,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000
CVE-2025-53500,0,0,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000
CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000
CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000
@ -299744,6 +299784,7 @@ CVE-2025-53539,0,0,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b1
CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000
CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000
CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000
CVE-2025-53547,1,1,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000
CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000
CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000
CVE-2025-53568,0,0,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000
@ -300673,7 +300714,7 @@ CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce2
CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000
CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000
CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000
CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000
CVE-2025-6550,0,1,89e239136c37d0091ac7da31fce424150e754df9694a35b76fceef47cee0376e,2025-07-08T22:15:28.053000
CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000
@ -300802,6 +300843,7 @@ CVE-2025-6752,0,0,d618339d30498ab434c65ab8e70ead8372a7351acdadb43706f579edd48b3c
CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000
CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000
CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000
CVE-2025-6759,1,1,fd5ad8950faaf00037797969f812bda1b912165b72aa82116a14ba1f59189b19,2025-07-08T22:15:28.213000
CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000
CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000
CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000
@ -300963,8 +301005,8 @@ CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0e
CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000
CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000
CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000
CVE-2025-7030,1,1,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000
CVE-2025-7031,1,1,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000
CVE-2025-7030,0,0,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000
CVE-2025-7031,0,0,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000
CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000
CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000
CVE-2025-7053,0,0,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000
@ -301092,10 +301134,14 @@ CVE-2025-7188,0,0,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8
CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000
CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000
CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000
CVE-2025-7192,1,1,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000
CVE-2025-7193,1,1,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000
CVE-2025-7194,1,1,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000
CVE-2025-7196,1,1,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000
CVE-2025-7192,0,0,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000
CVE-2025-7193,0,0,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000
CVE-2025-7194,0,0,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000
CVE-2025-7196,0,0,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000
CVE-2025-7197,1,1,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000
CVE-2025-7198,1,1,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000
CVE-2025-7199,1,1,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000
CVE-2025-7200,1,1,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000
CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000
CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000
CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000

Can't render this file because it is too large.