Auto-Update: 2025-07-08T23:55:11.663896+00:00

This commit is contained in:
cad-safe-bot 2025-07-08 23:58:48 +00:00
parent 81926446c5
commit 53d9948a50
49 changed files with 3091 additions and 104 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2024-56468",
"sourceIdentifier": "psirt@us.ibm.com",
"published": "2025-07-08T23:15:22.840",
"lastModified": "2025-07-08T23:15:22.840",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "IBM InfoSphere Data Replication VSAM for z/OS Remote Source 11.4 could allow a remote user to cause a denial of service by sending an invalid HTTP request to the log reading service."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@us.ibm.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://www.ibm.com/support/pages/node/7239221",
"source": "psirt@us.ibm.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27165",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.107",
"lastModified": "2025-07-08T22:15:24.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Substance3D - Stager versions 3.1.2 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/substance3d_stager/apsb25-64.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-27203",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.717",
"lastModified": "2025-07-08T22:15:24.717",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Connect versions 24.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does require user interaction and scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/connect/apsb25-61.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-30313",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:24.887",
"lastModified": "2025-07-08T22:15:24.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43591",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.050",
"lastModified": "2025-07-08T22:15:25.050",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43592",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.217",
"lastModified": "2025-07-08T22:15:25.217",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-43594",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.397",
"lastModified": "2025-07-08T22:15:25.397",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47097",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:23.687",
"lastModified": "2025-07-08T23:15:23.687",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47098",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:23.850",
"lastModified": "2025-07-08T23:15:23.850",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47099",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.013",
"lastModified": "2025-07-08T23:15:24.013",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InCopy versions 20.3, 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/incopy/apsb25-59.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47103",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.553",
"lastModified": "2025-07-08T22:15:25.553",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47119",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.173",
"lastModified": "2025-07-08T23:15:24.173",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47120",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.337",
"lastModified": "2025-07-08T23:15:24.337",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47121",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.487",
"lastModified": "2025-07-08T23:15:24.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47122",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.640",
"lastModified": "2025-07-08T23:15:24.640",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47123",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.797",
"lastModified": "2025-07-08T23:15:24.797",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47124",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:24.953",
"lastModified": "2025-07-08T23:15:24.953",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47125",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.117",
"lastModified": "2025-07-08T23:15:25.117",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47126",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.280",
"lastModified": "2025-07-08T23:15:25.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47127",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.443",
"lastModified": "2025-07-08T23:15:25.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47128",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.593",
"lastModified": "2025-07-08T23:15:25.593",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47129",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.757",
"lastModified": "2025-07-08T23:15:25.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47130",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:25.910",
"lastModified": "2025-07-08T23:15:25.910",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47131",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.073",
"lastModified": "2025-07-08T23:15:26.073",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47132",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.223",
"lastModified": "2025-07-08T23:15:26.223",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47133",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T23:15:26.390",
"lastModified": "2025-07-08T23:15:26.390",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Framemaker versions 2020.8, 2022.6 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/framemaker/apsb25-66.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47134",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.703",
"lastModified": "2025-07-08T22:15:25.703",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-47136",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:25.857",
"lastModified": "2025-07-08T22:15:25.857",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "InDesign Desktop versions 19.5.3 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/indesign/apsb25-60.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49524",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.010",
"lastModified": "2025-07-08T22:15:26.010",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing a disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-476"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49525",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.183",
"lastModified": "2025-07-08T22:15:26.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49526",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.340",
"lastModified": "2025-07-08T22:15:26.340",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49527",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.500",
"lastModified": "2025-07-08T22:15:26.500",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49528",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.657",
"lastModified": "2025-07-08T22:15:26.657",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by a Stack-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-121"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49529",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.810",
"lastModified": "2025-07-08T22:15:26.810",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Access of Uninitialized Pointer vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-824"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49530",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:26.960",
"lastModified": "2025-07-08T22:15:26.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an out-of-bounds write vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49531",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.113",
"lastModified": "2025-07-08T22:15:27.113",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Overflow or Wraparound vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-190"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49532",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.273",
"lastModified": "2025-07-08T22:15:27.273",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Illustrator versions 28.7.6, 29.5.1 and earlier are affected by an Integer Underflow (Wrap or Wraparound) vulnerability that could result in arbitrary code execution in the context of the current user. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-191"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/illustrator/apsb25-65.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49533",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.423",
"lastModified": "2025-07-08T22:15:27.423",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager (MS) versions 6.5.23.0 and earlier are affected by a Deserialization of Untrusted Data vulnerability that could lead to arbitrary code execution by an attacker. Exploitation of this issue does not require user interaction. Scope is unchanged."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-502"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-forms/apsb25-67.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49534",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.587",
"lastModified": "2025-07-08T22:15:27.587",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-49547",
"sourceIdentifier": "psirt@adobe.com",
"published": "2025-07-08T22:15:27.737",
"lastModified": "2025-07-08T22:15:27.737",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Adobe Experience Manager versions 11.4 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a low-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field. Scope is changed."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.3,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "psirt@adobe.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"references": [
{
"url": "https://helpx.adobe.com/security/products/aem-screens/apsb25-68.html",
"source": "psirt@adobe.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-53547",
"sourceIdentifier": "security-advisories@github.com",
"published": "2025-07-08T22:15:27.897",
"lastModified": "2025-07-08T22:15:27.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Helm is a package manager for Charts for Kubernetes. Prior to 3.18.4, a specially crafted Chart.yaml file along with a specially linked Chart.lock file can lead to local code execution when dependencies are updated. Fields in a Chart.yaml file, that are carried over to a Chart.lock file when dependencies are updated and this file is written, can be crafted in a way that can cause execution if that same content were in a file that is executed (e.g., a bash.rc file or shell script). If the Chart.lock file is symlinked to one of these files updating dependencies will write the lock file content to the symlinked file. This can lead to unwanted execution. Helm warns of the symlinked file but did not stop execution due to symlinking. This issue has been resolved in Helm v3.18.4."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "security-advisories@github.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:H/A:H",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 6.0
}
]
},
"weaknesses": [
{
"source": "security-advisories@github.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-94"
}
]
}
],
"references": [
{
"url": "https://github.com/helm/helm/commit/4b8e61093d8f579f1165cdc6bd4b43fa5455f571",
"source": "security-advisories@github.com"
},
{
"url": "https://github.com/helm/helm/security/advisories/GHSA-557j-xg8c-q2mm",
"source": "security-advisories@github.com"
}
]
}

View File

@ -2,13 +2,13 @@
"id": "CVE-2025-6550", "id": "CVE-2025-6550",
"sourceIdentifier": "security@wordfence.com", "sourceIdentifier": "security@wordfence.com",
"published": "2025-06-27T08:15:23.053", "published": "2025-06-27T08:15:23.053",
"lastModified": "2025-07-07T15:38:38.413", "lastModified": "2025-07-08T22:15:28.053",
"vulnStatus": "Analyzed", "vulnStatus": "Modified",
"cveTags": [], "cveTags": [],
"descriptions": [ "descriptions": [
{ {
"lang": "en", "lang": "en",
"value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page." "value": "The The Pack Elementor addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the \u2018slider_options\u2019 parameter in all versions up to, and including, 2.1.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
}, },
{ {
"lang": "es", "lang": "es",
@ -62,7 +62,7 @@
"weaknesses": [ "weaknesses": [
{ {
"source": "security@wordfence.com", "source": "security@wordfence.com",
"type": "Primary", "type": "Secondary",
"description": [ "description": [
{ {
"lang": "en", "lang": "en",
@ -132,6 +132,14 @@
"Product" "Product"
] ]
}, },
{
"url": "https://plugins.trac.wordpress.org/changeset/3320280/",
"source": "security@wordfence.com"
},
{
"url": "https://plugins.trac.wordpress.org/changeset/3321887/",
"source": "security@wordfence.com"
},
{ {
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af2f136-5806-4d5e-a72d-486c4839a695?source=cve", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/4af2f136-5806-4d5e-a72d-486c4839a695?source=cve",
"source": "security@wordfence.com", "source": "security@wordfence.com",

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-6759",
"sourceIdentifier": "secure@citrix.com",
"published": "2025-07-08T22:15:28.213",
"lastModified": "2025-07-08T22:15:28.213",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges\u00a0in Windows Virtual Delivery Agent for CVAD and Citrix DaaS"
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "secure@citrix.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-269"
}
]
}
],
"references": [
{
"url": "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694820",
"source": "secure@citrix.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7197",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T22:15:28.363",
"lastModified": "2025-07-08T22:15:28.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in code-projects Jonnys Liquor 1.0. This affects an unknown part of the file /admin/delete-row.php. The manipulation of the argument ID leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/18889016001/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315135",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607819",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7198",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T22:15:28.563",
"lastModified": "2025-07-08T22:15:28.563",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical was found in code-projects Jonnys Liquor 1.0. This vulnerability affects unknown code of the file /admin/admin-area.php. The manipulation of the argument drink leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/18889016001/cve/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315136",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607820",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-7199",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T23:15:26.547",
"lastModified": "2025-07-08T23:15:26.547",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, has been found in code-projects Library System 1.0. This issue affects some unknown processing of the file /notapprove.php. The manipulation of the argument ID leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/Gemileo/CVE/issues/2",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315137",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315137",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607470",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,141 @@
{
"id": "CVE-2025-7200",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-07-08T23:15:26.757",
"lastModified": "2025-07-08T23:15:26.757",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in krishna9772 Pharmacy Management System up to a2efc8442931ec9308f3b4cf4778e5701153f4e5. Affected is an unknown function of the file quantity_upd.php. The manipulation of the argument med_name/med_cat/ex_date leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://github.com/horytick/CVE/blob/main/SQL%20Injection%20Vulnerability%20in%20Pharmacy%20Management%20System.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.315138",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.315138",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.607526",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-07-08T22:00:12.613889+00:00 2025-07-08T23:55:11.663896+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-07-08T21:15:29.963000+00:00 2025-07-08T23:15:26.757000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,66 +33,45 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
301104 301150
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `24` Recently added CVEs: `46`
- [CVE-2025-37103](CVE-2025/CVE-2025-371xx/CVE-2025-37103.json) (`2025-07-08T20:15:26.033`) - [CVE-2025-47129](CVE-2025/CVE-2025-471xx/CVE-2025-47129.json) (`2025-07-08T23:15:25.757`)
- [CVE-2025-43582](CVE-2025/CVE-2025-435xx/CVE-2025-43582.json) (`2025-07-08T21:15:25.387`) - [CVE-2025-47130](CVE-2025/CVE-2025-471xx/CVE-2025-47130.json) (`2025-07-08T23:15:25.910`)
- [CVE-2025-43583](CVE-2025/CVE-2025-435xx/CVE-2025-43583.json) (`2025-07-08T21:15:25.543`) - [CVE-2025-47131](CVE-2025/CVE-2025-471xx/CVE-2025-47131.json) (`2025-07-08T23:15:26.073`)
- [CVE-2025-43584](CVE-2025/CVE-2025-435xx/CVE-2025-43584.json) (`2025-07-08T21:15:25.690`) - [CVE-2025-47132](CVE-2025/CVE-2025-471xx/CVE-2025-47132.json) (`2025-07-08T23:15:26.223`)
- [CVE-2025-49535](CVE-2025/CVE-2025-495xx/CVE-2025-49535.json) (`2025-07-08T21:15:26.113`) - [CVE-2025-47133](CVE-2025/CVE-2025-471xx/CVE-2025-47133.json) (`2025-07-08T23:15:26.390`)
- [CVE-2025-49536](CVE-2025/CVE-2025-495xx/CVE-2025-49536.json) (`2025-07-08T21:15:26.280`) - [CVE-2025-47134](CVE-2025/CVE-2025-471xx/CVE-2025-47134.json) (`2025-07-08T22:15:25.703`)
- [CVE-2025-49537](CVE-2025/CVE-2025-495xx/CVE-2025-49537.json) (`2025-07-08T21:15:26.437`) - [CVE-2025-47136](CVE-2025/CVE-2025-471xx/CVE-2025-47136.json) (`2025-07-08T22:15:25.857`)
- [CVE-2025-49538](CVE-2025/CVE-2025-495xx/CVE-2025-49538.json) (`2025-07-08T21:15:26.597`) - [CVE-2025-49524](CVE-2025/CVE-2025-495xx/CVE-2025-49524.json) (`2025-07-08T22:15:26.010`)
- [CVE-2025-49539](CVE-2025/CVE-2025-495xx/CVE-2025-49539.json) (`2025-07-08T21:15:26.757`) - [CVE-2025-49525](CVE-2025/CVE-2025-495xx/CVE-2025-49525.json) (`2025-07-08T22:15:26.183`)
- [CVE-2025-49540](CVE-2025/CVE-2025-495xx/CVE-2025-49540.json) (`2025-07-08T21:15:26.907`) - [CVE-2025-49526](CVE-2025/CVE-2025-495xx/CVE-2025-49526.json) (`2025-07-08T22:15:26.340`)
- [CVE-2025-49541](CVE-2025/CVE-2025-495xx/CVE-2025-49541.json) (`2025-07-08T21:15:27.060`) - [CVE-2025-49527](CVE-2025/CVE-2025-495xx/CVE-2025-49527.json) (`2025-07-08T22:15:26.500`)
- [CVE-2025-49542](CVE-2025/CVE-2025-495xx/CVE-2025-49542.json) (`2025-07-08T21:15:27.213`) - [CVE-2025-49528](CVE-2025/CVE-2025-495xx/CVE-2025-49528.json) (`2025-07-08T22:15:26.657`)
- [CVE-2025-49543](CVE-2025/CVE-2025-495xx/CVE-2025-49543.json) (`2025-07-08T21:15:27.360`) - [CVE-2025-49529](CVE-2025/CVE-2025-495xx/CVE-2025-49529.json) (`2025-07-08T22:15:26.810`)
- [CVE-2025-49544](CVE-2025/CVE-2025-495xx/CVE-2025-49544.json) (`2025-07-08T21:15:27.520`) - [CVE-2025-49530](CVE-2025/CVE-2025-495xx/CVE-2025-49530.json) (`2025-07-08T22:15:26.960`)
- [CVE-2025-49545](CVE-2025/CVE-2025-495xx/CVE-2025-49545.json) (`2025-07-08T21:15:27.670`) - [CVE-2025-49531](CVE-2025/CVE-2025-495xx/CVE-2025-49531.json) (`2025-07-08T22:15:27.113`)
- [CVE-2025-49546](CVE-2025/CVE-2025-495xx/CVE-2025-49546.json) (`2025-07-08T21:15:27.820`) - [CVE-2025-49532](CVE-2025/CVE-2025-495xx/CVE-2025-49532.json) (`2025-07-08T22:15:27.273`)
- [CVE-2025-49551](CVE-2025/CVE-2025-495xx/CVE-2025-49551.json) (`2025-07-08T21:15:27.970`) - [CVE-2025-49533](CVE-2025/CVE-2025-495xx/CVE-2025-49533.json) (`2025-07-08T22:15:27.423`)
- [CVE-2025-53355](CVE-2025/CVE-2025-533xx/CVE-2025-53355.json) (`2025-07-08T20:15:30.020`) - [CVE-2025-49534](CVE-2025/CVE-2025-495xx/CVE-2025-49534.json) (`2025-07-08T22:15:27.587`)
- [CVE-2025-7030](CVE-2025/CVE-2025-70xx/CVE-2025-7030.json) (`2025-07-08T21:15:28.773`) - [CVE-2025-49547](CVE-2025/CVE-2025-495xx/CVE-2025-49547.json) (`2025-07-08T22:15:27.737`)
- [CVE-2025-7031](CVE-2025/CVE-2025-70xx/CVE-2025-7031.json) (`2025-07-08T21:15:28.907`) - [CVE-2025-53547](CVE-2025/CVE-2025-535xx/CVE-2025-53547.json) (`2025-07-08T22:15:27.897`)
- [CVE-2025-7192](CVE-2025/CVE-2025-71xx/CVE-2025-7192.json) (`2025-07-08T20:15:30.830`) - [CVE-2025-6759](CVE-2025/CVE-2025-67xx/CVE-2025-6759.json) (`2025-07-08T22:15:28.213`)
- [CVE-2025-7193](CVE-2025/CVE-2025-71xx/CVE-2025-7193.json) (`2025-07-08T20:15:31.040`) - [CVE-2025-7197](CVE-2025/CVE-2025-71xx/CVE-2025-7197.json) (`2025-07-08T22:15:28.363`)
- [CVE-2025-7194](CVE-2025/CVE-2025-71xx/CVE-2025-7194.json) (`2025-07-08T21:15:29.763`) - [CVE-2025-7198](CVE-2025/CVE-2025-71xx/CVE-2025-7198.json) (`2025-07-08T22:15:28.563`)
- [CVE-2025-7196](CVE-2025/CVE-2025-71xx/CVE-2025-7196.json) (`2025-07-08T21:15:29.963`) - [CVE-2025-7199](CVE-2025/CVE-2025-71xx/CVE-2025-7199.json) (`2025-07-08T23:15:26.547`)
- [CVE-2025-7200](CVE-2025/CVE-2025-72xx/CVE-2025-7200.json) (`2025-07-08T23:15:26.757`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `23` Recently modified CVEs: `1`
- [CVE-2020-1171](CVE-2020/CVE-2020-11xx/CVE-2020-1171.json) (`2025-07-08T20:03:48.173`) - [CVE-2025-6550](CVE-2025/CVE-2025-65xx/CVE-2025-6550.json) (`2025-07-08T22:15:28.053`)
- [CVE-2020-1192](CVE-2020/CVE-2020-11xx/CVE-2020-1192.json) (`2025-07-08T20:03:48.173`)
- [CVE-2024-35144](CVE-2024/CVE-2024-351xx/CVE-2024-35144.json) (`2025-07-08T20:29:44.110`)
- [CVE-2024-35145](CVE-2024/CVE-2024-351xx/CVE-2024-35145.json) (`2025-07-08T20:29:30.803`)
- [CVE-2024-35146](CVE-2024/CVE-2024-351xx/CVE-2024-35146.json) (`2025-07-08T20:29:54.267`)
- [CVE-2024-35148](CVE-2024/CVE-2024-351xx/CVE-2024-35148.json) (`2025-07-08T20:27:05.503`)
- [CVE-2024-35150](CVE-2024/CVE-2024-351xx/CVE-2024-35150.json) (`2025-07-08T20:22:34.600`)
- [CVE-2025-0158](CVE-2025/CVE-2025-01xx/CVE-2025-0158.json) (`2025-07-08T20:06:15.347`)
- [CVE-2025-0759](CVE-2025/CVE-2025-07xx/CVE-2025-0759.json) (`2025-07-08T20:05:43.337`)
- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-07-08T20:14:36.577`)
- [CVE-2025-29267](CVE-2025/CVE-2025-292xx/CVE-2025-29267.json) (`2025-07-08T21:15:24.580`)
- [CVE-2025-31022](CVE-2025/CVE-2025-310xx/CVE-2025-31022.json) (`2025-07-08T20:15:25.710`)
- [CVE-2025-37102](CVE-2025/CVE-2025-371xx/CVE-2025-37102.json) (`2025-07-08T20:15:25.900`)
- [CVE-2025-47422](CVE-2025/CVE-2025-474xx/CVE-2025-47422.json) (`2025-07-08T21:15:25.947`)
- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-07-08T20:35:15.717`)
- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-07-08T20:34:54.967`)
- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-07-08T20:35:27.190`)
- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-07-08T20:35:36.687`)
- [CVE-2025-53480](CVE-2025/CVE-2025-534xx/CVE-2025-53480.json) (`2025-07-08T21:15:28.227`)
- [CVE-2025-53495](CVE-2025/CVE-2025-534xx/CVE-2025-53495.json) (`2025-07-08T20:15:30.183`)
- [CVE-2025-53496](CVE-2025/CVE-2025-534xx/CVE-2025-53496.json) (`2025-07-08T20:15:30.430`)
- [CVE-2025-53498](CVE-2025/CVE-2025-534xx/CVE-2025-53498.json) (`2025-07-08T21:15:28.380`)
- [CVE-2025-53499](CVE-2025/CVE-2025-534xx/CVE-2025-53499.json) (`2025-07-08T20:15:30.623`)
## Download and Usage ## Download and Usage

View File

@ -146933,7 +146933,7 @@ CVE-2020-11706,0,0,eeb8b638cf071245d8e93f3342f14ca45f3d2e4a2e7a21ed1fbde0b2d8007
CVE-2020-11707,0,0,db51c5eee738c62c43b8709f5d6b70925efb3e350231121ab8f26f9ebc6a1536,2024-11-21T04:58:26.883000 CVE-2020-11707,0,0,db51c5eee738c62c43b8709f5d6b70925efb3e350231121ab8f26f9ebc6a1536,2024-11-21T04:58:26.883000
CVE-2020-11708,0,0,b5ddea211cc308f025c496f1c9162a7ce419e37388999e4c540d9fccfa3032d5,2024-11-21T04:58:27.020000 CVE-2020-11708,0,0,b5ddea211cc308f025c496f1c9162a7ce419e37388999e4c540d9fccfa3032d5,2024-11-21T04:58:27.020000
CVE-2020-11709,0,0,b76b211e9d44f50570ba99ce7aa237753934914dac0fe2eb13fb806b4ae9541b,2024-11-21T04:58:27.163000 CVE-2020-11709,0,0,b76b211e9d44f50570ba99ce7aa237753934914dac0fe2eb13fb806b4ae9541b,2024-11-21T04:58:27.163000
CVE-2020-1171,0,1,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000 CVE-2020-1171,0,0,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000
CVE-2020-11710,0,0,0c881cb09aeff05a93a0b94dd8ba9913197a5ad156c9209bc4fdded71a2e1e29,2024-11-21T04:58:27.307000 CVE-2020-11710,0,0,0c881cb09aeff05a93a0b94dd8ba9913197a5ad156c9209bc4fdded71a2e1e29,2024-11-21T04:58:27.307000
CVE-2020-11711,0,0,f4106594acdf7e44ec44e6feabc08da09474b12d7322251671f1a20600de3f46,2024-11-21T04:58:27.460000 CVE-2020-11711,0,0,f4106594acdf7e44ec44e6feabc08da09474b12d7322251671f1a20600de3f46,2024-11-21T04:58:27.460000
CVE-2020-11712,0,0,9e2cb49800083b936e9e71815a929f166c3eb08584dd8b1dfaa2e54aada3a68a,2024-11-21T04:58:27.617000 CVE-2020-11712,0,0,9e2cb49800083b936e9e71815a929f166c3eb08584dd8b1dfaa2e54aada3a68a,2024-11-21T04:58:27.617000
@ -147140,7 +147140,7 @@ CVE-2020-11916,0,0,b030395624f14d3ddfb34e8361472323e30df1a28f655a305ea4e251b2e59
CVE-2020-11917,0,0,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000 CVE-2020-11917,0,0,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000
CVE-2020-11918,0,0,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000 CVE-2020-11918,0,0,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000
CVE-2020-11919,0,0,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000 CVE-2020-11919,0,0,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000
CVE-2020-1192,0,1,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000 CVE-2020-1192,0,0,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000
CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000 CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000
CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000 CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000
CVE-2020-11922,0,0,34dee0addcbefd37e031f6dbedb5ad1741ebc2710364aac63adc194527b15f99,2024-11-21T04:58:54.733000 CVE-2020-11922,0,0,34dee0addcbefd37e031f6dbedb5ad1741ebc2710364aac63adc194527b15f99,2024-11-21T04:58:54.733000
@ -261859,12 +261859,12 @@ CVE-2024-35140,0,0,dcb39679630ddcaef3b6511185b27681ac1153141e804705769f97c9da434
CVE-2024-35141,0,0,3e97d4328bde3a3960ec1e8a98391f50d1264f252049e70e215d2b003d7be7ab,2025-01-29T21:00:00.257000 CVE-2024-35141,0,0,3e97d4328bde3a3960ec1e8a98391f50d1264f252049e70e215d2b003d7be7ab,2025-01-29T21:00:00.257000
CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000 CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000
CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000 CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000
CVE-2024-35144,0,1,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000 CVE-2024-35144,0,0,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000
CVE-2024-35145,0,1,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000 CVE-2024-35145,0,0,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000
CVE-2024-35146,0,1,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000 CVE-2024-35146,0,0,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000
CVE-2024-35148,0,1,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000 CVE-2024-35148,0,0,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000
CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000 CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000
CVE-2024-35150,0,1,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000 CVE-2024-35150,0,0,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000
CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000 CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000
CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000 CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000
CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000 CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000
@ -277792,6 +277792,7 @@ CVE-2024-56456,0,0,ffa3e9a4f19018bcf11c859795308311b14e0895d36772f424432ee894d6d
CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000 CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb9a,2025-02-05T14:47:15.223000
CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000 CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000
CVE-2024-56467,0,0,a637c2bcf3b6a4a4b3f08718b44e1be4e289aad16c95ae9f9eab032a86fca295,2025-07-07T18:26:35.707000 CVE-2024-56467,0,0,a637c2bcf3b6a4a4b3f08718b44e1be4e289aad16c95ae9f9eab032a86fca295,2025-07-07T18:26:35.707000
CVE-2024-56468,1,1,ff714809f0017608b02b1568a755730d7355f8721e1ec2e84d6131947b4e0bc8,2025-07-08T23:15:22.840000
CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000 CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000
CVE-2024-5647,0,0,ab8dda8bbe1d15e33baced30b68dc6602e623ee999011776cef9f579e77b11cf,2025-07-03T15:13:53.147000 CVE-2024-5647,0,0,ab8dda8bbe1d15e33baced30b68dc6602e623ee999011776cef9f579e77b11cf,2025-07-03T15:13:53.147000
CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000 CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000
@ -282983,7 +282984,7 @@ CVE-2025-0149,0,0,c862a88db319c8eef1ca91fc74c77e313cc2ee14a94c70931d8815bb3a5c42
CVE-2025-0150,0,0,dca63b1abf1123a886706c853958072be5044d1c9ef23070ccdaffe267aedd34,2025-03-11T18:15:29.800000 CVE-2025-0150,0,0,dca63b1abf1123a886706c853958072be5044d1c9ef23070ccdaffe267aedd34,2025-03-11T18:15:29.800000
CVE-2025-0151,0,0,ee31fb3c9dd590238f179f6f3a56f394ab47d251029c9adfaeba4c64aca0174c,2025-03-11T18:15:29.940000 CVE-2025-0151,0,0,ee31fb3c9dd590238f179f6f3a56f394ab47d251029c9adfaeba4c64aca0174c,2025-03-11T18:15:29.940000
CVE-2025-0154,0,0,50cc7e4c9f2877c13739ab14af2e76b9d150968a2d961bf547c3aad04539fac0,2025-04-07T14:18:49.830000 CVE-2025-0154,0,0,50cc7e4c9f2877c13739ab14af2e76b9d150968a2d961bf547c3aad04539fac0,2025-04-07T14:18:49.830000
CVE-2025-0158,0,1,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000 CVE-2025-0158,0,0,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000
CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000 CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000
CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000 CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000 CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
@ -283476,7 +283477,7 @@ CVE-2025-0755,0,0,6d0dbadfda4a802c88ca940e4a533e59c6edc3de28616d86b3c764f16adc71
CVE-2025-0756,0,0,2f503184d01f58f956cb3d61accff5238661a48ad3360193623bab7de05b60ea,2025-04-17T20:21:48.243000 CVE-2025-0756,0,0,2f503184d01f58f956cb3d61accff5238661a48ad3360193623bab7de05b60ea,2025-04-17T20:21:48.243000
CVE-2025-0757,0,0,28a402bbfb840751157b78e725c0bb0f7484cb6d9360d77a653a5b5f45018749,2025-04-17T20:21:48.243000 CVE-2025-0757,0,0,28a402bbfb840751157b78e725c0bb0f7484cb6d9360d77a653a5b5f45018749,2025-04-17T20:21:48.243000
CVE-2025-0758,0,0,727f4ea3aa4edd214a32da546eaa17a87b0da516ccecd5a176ebefb6a6f5ee34,2025-04-17T20:21:48.243000 CVE-2025-0758,0,0,727f4ea3aa4edd214a32da546eaa17a87b0da516ccecd5a176ebefb6a6f5ee34,2025-04-17T20:21:48.243000
CVE-2025-0759,0,1,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000 CVE-2025-0759,0,0,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000 CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
CVE-2025-0762,0,0,03f57ccaa8cea227bf85d5172a4940cc05d8a50f3c1e62b0d5c2821514db1a51,2025-04-21T20:53:55.553000 CVE-2025-0762,0,0,03f57ccaa8cea227bf85d5172a4940cc05d8a50f3c1e62b0d5c2821514db1a51,2025-04-21T20:53:55.553000
CVE-2025-0764,0,0,77273f85eebda75df5c1b10c7e10eb8fa4db2d37828ed49e781e9b7366818024,2025-03-06T17:57:14.677000 CVE-2025-0764,0,0,77273f85eebda75df5c1b10c7e10eb8fa4db2d37828ed49e781e9b7366818024,2025-03-06T17:57:14.677000
@ -284083,7 +284084,7 @@ CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d445
CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000 CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000
CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000 CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000
CVE-2025-1499,0,0,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000 CVE-2025-1499,0,0,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000
CVE-2025-1500,0,1,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000 CVE-2025-1500,0,0,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000 CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000 CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000
CVE-2025-1504,0,0,0e09d380d5124abfd6e1c49748bbac5d04454a770e81e97825f6db7a4e571c1f,2025-03-24T18:27:10.747000 CVE-2025-1504,0,0,0e09d380d5124abfd6e1c49748bbac5d04454a770e81e97825f6db7a4e571c1f,2025-03-24T18:27:10.747000
@ -289954,6 +289955,7 @@ CVE-2025-27161,0,0,e2daf6461b200bca09da7de40a88d9c467451fb23187bd82948c062f9b5be
CVE-2025-27162,0,0,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000 CVE-2025-27162,0,0,b6d148bb543fa8cab2a2e14b6258dcc6bd02e7bfdcab4c409efcbc44ae504fb8,2025-04-28T16:48:39.727000
CVE-2025-27163,0,0,81f9699e5b11ea3842ffe9245801daecdb91eec74b0663ccf8976a83a7348e35,2025-04-28T16:48:36.780000 CVE-2025-27163,0,0,81f9699e5b11ea3842ffe9245801daecdb91eec74b0663ccf8976a83a7348e35,2025-04-28T16:48:36.780000
CVE-2025-27164,0,0,1e629a8207bea42d1358f357512432dc28b249a65ee22a83932b7b9ee7da9dde,2025-04-28T16:48:33.017000 CVE-2025-27164,0,0,1e629a8207bea42d1358f357512432dc28b249a65ee22a83932b7b9ee7da9dde,2025-04-28T16:48:33.017000
CVE-2025-27165,1,1,155ef390f669d6468b0102ed2c72d4380689dc4db0ed799a4f6608e79cc30933,2025-07-08T22:15:24.107000
CVE-2025-27166,0,0,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000 CVE-2025-27166,0,0,5022e29cb2fc1ef4a7439717f59195861ec489ae1633e7bf61f51adda22ed1de,2025-04-28T17:05:20.700000
CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000 CVE-2025-27167,0,0,9fc03919f99441cc6e5924699f0b5c87cd969352015206acd2e76f4d0a20cd30,2025-03-31T20:06:44.963000
CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000 CVE-2025-27168,0,0,f99984308c3ede254daed21e56e764d668905b50bfa211ed61f2d84fac69bffd,2025-03-31T20:06:08.030000
@ -289995,6 +289997,7 @@ CVE-2025-2720,0,0,9ae0525d8f85a05348d1159e71fc380adf3a8b9852bd68a0d6d2a49136b12c
CVE-2025-27200,0,0,2d55459379d67dca2d0eb314eb2150af648e2a6572b027ee78112b380b949b64,2025-04-18T14:40:40.313000 CVE-2025-27200,0,0,2d55459379d67dca2d0eb314eb2150af648e2a6572b027ee78112b380b949b64,2025-04-18T14:40:40.313000
CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000 CVE-2025-27201,0,0,e16a69f1e6ee9c10ddc82bfd85516ec2ecce4ab46419db4f3ca5e53d3f6d3f33,2025-04-15T19:47:25.960000
CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000 CVE-2025-27202,0,0,e2fb121a71de22e29c90f28400f5e2a8546243d6f41eee6c3fef551b0ae3b445,2025-04-15T19:50:43.587000
CVE-2025-27203,1,1,4ac4588eba67d8607f05965f50eae40867fdeefa38cdc1f8b334d6ea289cf222,2025-07-08T22:15:24.717000
CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000 CVE-2025-27204,0,0,915ee58270bed657aa3414a33920c2828a16919cebf1c439beba158fba489933,2025-04-15T19:56:13.910000
CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000 CVE-2025-27205,0,0,b5a3be62757c631169ae6f30a73aa85000f349fef09deb61e50341f0061f73f9,2025-04-09T20:03:01.577000
CVE-2025-27206,0,0,d294d50f3906c6fb3fe785cd1596aadcf69ed2db2162953cfc8dc1288ebf1c78,2025-06-23T19:25:38.097000 CVE-2025-27206,0,0,d294d50f3906c6fb3fe785cd1596aadcf69ed2db2162953cfc8dc1288ebf1c78,2025-06-23T19:25:38.097000
@ -291001,7 +291004,7 @@ CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c
CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000 CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000
CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000 CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000
CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000 CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000
CVE-2025-29267,0,1,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000 CVE-2025-29267,0,0,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000
CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000 CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000 CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000
CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000 CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000
@ -291544,6 +291547,7 @@ CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f734799450
CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000 CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000
CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000 CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000
CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000 CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000
CVE-2025-30313,1,1,6fe792e37fa789df49a338e7f0e30726bb6c2367c67fc5969480fd4a5fd962ce,2025-07-08T22:15:24.887000
CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000 CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000
CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000 CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000
CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000 CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000
@ -292202,7 +292206,7 @@ CVE-2025-31019,0,0,0ce2758b0a8e888aab73b46b8932e361c63f6d92aba8710ee3abf24f3437a
CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000 CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000
CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000 CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000
CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000 CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000
CVE-2025-31022,0,1,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000 CVE-2025-31022,0,0,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000
CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000 CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000
CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000 CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000
CVE-2025-31025,0,0,053527fbe27001f119a974095c520ba6e0ed6e07579def4bdb1aa3af4361283c,2025-06-06T14:06:58.193000 CVE-2025-31025,0,0,053527fbe27001f119a974095c520ba6e0ed6e07579def4bdb1aa3af4361283c,2025-06-06T14:06:58.193000
@ -294464,8 +294468,8 @@ CVE-2025-37099,0,0,067e991498d8cba31dd0ba2256a8ecf23acb321ae5ac75f861fdab474706e
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000 CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
CVE-2025-37100,0,0,88b9ad7c7695f3a4670adb22647dcc8cbf099c03d5439646676dc63333e683a5,2025-06-12T16:06:39.330000 CVE-2025-37100,0,0,88b9ad7c7695f3a4670adb22647dcc8cbf099c03d5439646676dc63333e683a5,2025-06-12T16:06:39.330000
CVE-2025-37101,0,0,611db152f3bf6fbbe88c02a9c7c1f7f719963d9f48f127e010121dc26484aa06,2025-06-26T18:57:43.670000 CVE-2025-37101,0,0,611db152f3bf6fbbe88c02a9c7c1f7f719963d9f48f127e010121dc26484aa06,2025-06-26T18:57:43.670000
CVE-2025-37102,0,1,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000 CVE-2025-37102,0,0,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000
CVE-2025-37103,1,1,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000 CVE-2025-37103,0,0,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000 CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000 CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000 CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
@ -296099,9 +296103,9 @@ CVE-2025-43579,0,0,7eef94019923cdf7523c797919be9d42cfebb3f84c4aac09a8b6180f71a5f
CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000 CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000
CVE-2025-43580,0,0,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000 CVE-2025-43580,0,0,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000
CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000 CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000
CVE-2025-43582,1,1,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000 CVE-2025-43582,0,0,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000
CVE-2025-43583,1,1,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000 CVE-2025-43583,0,0,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000
CVE-2025-43584,1,1,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000 CVE-2025-43584,0,0,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000
CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000 CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000
CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000 CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000
CVE-2025-43587,0,0,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000 CVE-2025-43587,0,0,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000
@ -296109,7 +296113,10 @@ CVE-2025-43588,0,0,18f5e59b51717e1346fca3045898f24af5f456d77d491f9c5377ad6cd7d6d
CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000 CVE-2025-43589,0,0,88897a5ff9cb2e799cf7b02db25e13c1e1906eba4e99021ff3fa67fd0cc9ef9f,2025-06-16T21:31:39.580000
CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000 CVE-2025-4359,0,0,59ee176cba0c4e4e03aa8a60f5b2ae3d433f145526f53fa31de3f32e5e408c2d,2025-05-28T20:02:09.627000
CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000 CVE-2025-43590,0,0,f4ceb608883cf7e2697ab6b900971841d789b6d664b9bd657e34d743fae90306,2025-06-16T21:31:30.193000
CVE-2025-43591,1,1,6830c3e0d4762c9c103fc4598fee898be639970882dd0b7f06260439773a20ac,2025-07-08T22:15:25.050000
CVE-2025-43592,1,1,467a87e9b3d77fb41c1440a2b0fddf6ff8c9a732f7fd4c67296c7026a8b240d0,2025-07-08T22:15:25.217000
CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000 CVE-2025-43593,0,0,b84414267ab98c9b8606f91d272d445e5ba05cacff347c93ca65979eeb68eb16,2025-06-16T21:31:20.630000
CVE-2025-43594,1,1,648b3f694ce768ed9e4c2e3618b18b5cc3b87284168846e836a5c621bf849db3,2025-07-08T22:15:25.397000
CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000 CVE-2025-43595,0,0,ec533d0b32ab87a6e7dd76a79146ad6546e236f3fe580e7c0c1d4424d4e28c5b,2025-05-22T17:15:23.903000
CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000 CVE-2025-43596,0,0,29872261ca8016ff214f65d23588f315ee328e08b07cf2f6990482ee63e89e06,2025-05-23T15:55:02.040000
CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000 CVE-2025-4360,0,0,889f39d6fedc34404784b6ded7b84b7ae2156985291e2ce92d30fe81490d2582,2025-05-28T20:01:23.620000
@ -297335,8 +297342,12 @@ CVE-2025-47093,0,0,d041bb92bf35803d912e46cc3786fe6194a9f70224953010e6cfbbb689495
CVE-2025-47094,0,0,2b1e141c81f037a004986a2a6feda2400217e4605e2e7cbf768fa440e99bdb14,2025-06-16T14:47:48.470000 CVE-2025-47094,0,0,2b1e141c81f037a004986a2a6feda2400217e4605e2e7cbf768fa440e99bdb14,2025-06-16T14:47:48.470000
CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673a42,2025-06-11T00:15:27.457000 CVE-2025-47095,0,0,6692e6dca71a9ad0e88f0bb3f86803201fe675c9243f60adf2c9cc2e0a673a42,2025-06-11T00:15:27.457000
CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000 CVE-2025-47096,0,0,e36e469f5850085f588b67839209d7a2406a67c09a4e10c7e0b375d32031e9be,2025-06-16T14:47:44.727000
CVE-2025-47097,1,1,a32b4216bd3ba5587e5a8fb6bc2b5ce1dc4b740ce18afbf9eefdd622686b418f,2025-07-08T23:15:23.687000
CVE-2025-47098,1,1,e07334de3d0b5e6f86633570d8041dc6af3c394211803325d190792c71bf7349,2025-07-08T23:15:23.850000
CVE-2025-47099,1,1,ffb43766404e7cd47c3534f5792f8695dde3e0c2a232f081041fbec936aa6e9a,2025-07-08T23:15:24.013000
CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000 CVE-2025-4710,0,0,e39d67cb76ce566e1fa070d7e96f2d3191895b08d95f46b970d158a013f006a6,2025-05-28T14:25:57.370000
CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000 CVE-2025-47102,0,0,718a80105b6565fee66f0014accca7ba51fb51a15c80dbabb0b54b0424234e8d,2025-06-11T00:15:27.530000
CVE-2025-47103,1,1,0f958201632760b4bb1e0a74fe0514cd2c2c24ff9fae758401712bc4feb220f1,2025-07-08T22:15:25.553000
CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000 CVE-2025-47104,0,0,da9c2e508574f468f0e6080d7a92db8f4a9b2381c09785cf7de4c646bfe29e01,2025-06-16T21:31:11.607000
CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000 CVE-2025-47105,0,0,a7754d3c7f1382161f6093854cc0fccc706892435b48f3a2dff2e16f27a1401e,2025-06-16T21:30:52.307000
CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000 CVE-2025-47106,0,0,e2626924918687a8e0451f7a1ec838ee995185e6681d87245e83d1fec1ea89af,2025-06-16T21:30:33.830000
@ -297352,9 +297363,26 @@ CVE-2025-47114,0,0,d163492e89575318359525e72632c9c943e0e758e06a293f69c2dae9facfa
CVE-2025-47115,0,0,1bbfc8222a0849d3f615770e73bae226a0c8265c4bce8e1cd9a585d4ca4685bc,2025-06-16T14:47:31.267000 CVE-2025-47115,0,0,1bbfc8222a0849d3f615770e73bae226a0c8265c4bce8e1cd9a585d4ca4685bc,2025-06-16T14:47:31.267000
CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac507,2025-06-16T14:47:27.360000 CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac507,2025-06-16T14:47:27.360000
CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000 CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000
CVE-2025-47119,1,1,f0c8fd41e81c88d1be07c0092de74bc846c65420be78c31a437a33493dfc2c19,2025-07-08T23:15:24.173000
CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000 CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000
CVE-2025-47120,1,1,2867370570756813db7eb03adca268c3b4b39beb4e965ed18aa045454643cdb8,2025-07-08T23:15:24.337000
CVE-2025-47121,1,1,95929ef04ae37891c67ec941c0f1bdc68a55462f6f04ae4c9d7480897241edef,2025-07-08T23:15:24.487000
CVE-2025-47122,1,1,bc428eaaea677bf9f4191c6c900cfa0ec6aeca3bd6b744bdbda6b22fdaf1813b,2025-07-08T23:15:24.640000
CVE-2025-47123,1,1,149447a8d580ca6b8001eacc5c19def615fc1b3c0e12a79544af06138d927b01,2025-07-08T23:15:24.797000
CVE-2025-47124,1,1,2149c33e8d18c41701e1486795e64efec9f9a70061ecfc8ea77bcd7ae7ce0efe,2025-07-08T23:15:24.953000
CVE-2025-47125,1,1,df5fd29003f5ab9e7a945de707a95a6a022032c0606e4f254098df45e3106891,2025-07-08T23:15:25.117000
CVE-2025-47126,1,1,f6795b756fc831284dc88431ce3ead81a771ae3353bb117ba86a4d5eb30432e4,2025-07-08T23:15:25.280000
CVE-2025-47127,1,1,b4f61c867c13bed502ebf00cc063fc2ebbd2d6f10461d4efb4ffb8602c85cad4,2025-07-08T23:15:25.443000
CVE-2025-47128,1,1,611731a0747ad4703b5d747b06c39f1f3db635f3b11ed6538df8b7c543242e3b,2025-07-08T23:15:25.593000
CVE-2025-47129,1,1,e277e77d0c0c2b7c545a2d102ffa357116182e6b57b9b6154b9277fc7af8805b,2025-07-08T23:15:25.757000
CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000 CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000
CVE-2025-47130,1,1,80f775b176e0eec4c95abb50abc91cde6c7e1e969f05fc7b5dedaf530f78fdc9,2025-07-08T23:15:25.910000
CVE-2025-47131,1,1,025bd12695c59650091129dd599a7865168286a4f306798e3c71b00fea30ee17,2025-07-08T23:15:26.073000
CVE-2025-47132,1,1,ad5b20a6a03e2421e916bacae6c502b98cf21b20c97c7f22f6ca631de66efd15,2025-07-08T23:15:26.223000
CVE-2025-47133,1,1,960d61abfd9e907b69fe6e9fe40a3328a119e9f5e7b5ec858013b61e6b9860d0,2025-07-08T23:15:26.390000
CVE-2025-47134,1,1,bfd73800cd1b3d75d725db349716aaa75033a2ff8f0d93841f81712003f3d4c0,2025-07-08T22:15:25.703000
CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000 CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000
CVE-2025-47136,1,1,fd3c0672f300fcfaca803a507eed7620af44dc5f993b80653c0e8134a3dfcf86,2025-07-08T22:15:25.857000
CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000 CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000
CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000 CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000
CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000 CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000
@ -297458,7 +297486,7 @@ CVE-2025-47418,0,0,bdeebdcffdfcfa25a9c3fca2d88b0ef86304dd2bce949cfa926a70785bd61
CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000 CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000
CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000 CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000
CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000 CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000
CVE-2025-47422,0,1,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000 CVE-2025-47422,0,0,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000
CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000 CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000
CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000 CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000
CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000 CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000
@ -298364,11 +298392,11 @@ CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec72
CVE-2025-48914,0,0,da6bad0c4d0e6121a9d50700e2fc20599407401d3911e3bb2477eba8adbe7eea,2025-06-18T15:57:07.227000 CVE-2025-48914,0,0,da6bad0c4d0e6121a9d50700e2fc20599407401d3911e3bb2477eba8adbe7eea,2025-06-18T15:57:07.227000
CVE-2025-48915,0,0,d0d154b27b6b38bf355906ab2c27cbf671e5447a4489ef6508823c1eb32aeead,2025-06-18T15:57:25.617000 CVE-2025-48915,0,0,d0d154b27b6b38bf355906ab2c27cbf671e5447a4489ef6508823c1eb32aeead,2025-06-18T15:57:25.617000
CVE-2025-48916,0,0,064370efde96850d30de939e26f598a08846fb12f52793745ff31da22fd4e34e,2025-06-16T12:32:18.840000 CVE-2025-48916,0,0,064370efde96850d30de939e26f598a08846fb12f52793745ff31da22fd4e34e,2025-06-16T12:32:18.840000
CVE-2025-48917,0,1,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000 CVE-2025-48917,0,0,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000
CVE-2025-48918,0,1,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000 CVE-2025-48918,0,0,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000
CVE-2025-48919,0,1,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000 CVE-2025-48919,0,0,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000 CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
CVE-2025-48920,0,1,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000 CVE-2025-48920,0,0,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000
CVE-2025-48921,0,0,bf8abbd438522ab19b03d1fef94a34f38eef0e3ce6985bd31edb7d679cf6c776,2025-06-26T18:57:43.670000 CVE-2025-48921,0,0,bf8abbd438522ab19b03d1fef94a34f38eef0e3ce6985bd31edb7d679cf6c776,2025-06-26T18:57:43.670000
CVE-2025-48922,0,0,5a39c3a2314efaec349abc0bfa7dca0f34477df009f53b13f84a3980bc0a5a03,2025-06-26T18:57:43.670000 CVE-2025-48922,0,0,5a39c3a2314efaec349abc0bfa7dca0f34477df009f53b13f84a3980bc0a5a03,2025-06-26T18:57:43.670000
CVE-2025-48923,0,0,1b4953164a87b46a282bdab4066b15729f967660cf7b30e28abeb78958c86467,2025-06-26T18:57:43.670000 CVE-2025-48923,0,0,1b4953164a87b46a282bdab4066b15729f967660cf7b30e28abeb78958c86467,2025-06-26T18:57:43.670000
@ -298739,23 +298767,35 @@ CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0d
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000 CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000 CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000
CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000 CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000
CVE-2025-49535,1,1,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000 CVE-2025-49524,1,1,cf0534c507f7c5f47e05216df0397a22f256128f09d71caca35014be7037ec6d,2025-07-08T22:15:26.010000
CVE-2025-49536,1,1,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000 CVE-2025-49525,1,1,c043b565919129e48845c4164bc9fa3614b7d316f768d685dfd4ef1ea55eb1cc,2025-07-08T22:15:26.183000
CVE-2025-49537,1,1,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000 CVE-2025-49526,1,1,d9c6502c00f943f1d4ed6e7a11c47e0cdd69ba38c45e1c33442d9c9d0106560f,2025-07-08T22:15:26.340000
CVE-2025-49538,1,1,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000 CVE-2025-49527,1,1,0f96b6fe097a0e4a381adcc29941fd8e306ba564f7a3cbb4eb989c540f66e1a9,2025-07-08T22:15:26.500000
CVE-2025-49539,1,1,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000 CVE-2025-49528,1,1,c04d3258f8d6e7db1cf2d51a6a086de82dab581ba8e198e5e5036134288e141a,2025-07-08T22:15:26.657000
CVE-2025-49529,1,1,6c9158651c8d6f73f11c9fb70b3f2c1abba0d1b38edecc4c755cccbb6d93abb6,2025-07-08T22:15:26.810000
CVE-2025-49530,1,1,957bf34b474fba5de280895f12e0abfd24e823b5bfc9e19f5f13dd3aaede4674,2025-07-08T22:15:26.960000
CVE-2025-49531,1,1,321058713aac28893cebf8dd55502a6ac06a3eecb9af13ea3373ffa95c1dfbdc,2025-07-08T22:15:27.113000
CVE-2025-49532,1,1,395fe09750e5ab0de85f88a8bb0d7ddcacff97a4e91645ba5dd12d1822e76bb0,2025-07-08T22:15:27.273000
CVE-2025-49533,1,1,23d6b9fdd252390f8881e6f53f2b7cb4ede566acad453771a83c56bc08c8bfd1,2025-07-08T22:15:27.423000
CVE-2025-49534,1,1,88b71a5cc34e50c8fd5a55773bd40159fc244c03ace46b3b6241795308bce314,2025-07-08T22:15:27.587000
CVE-2025-49535,0,0,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000
CVE-2025-49536,0,0,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000
CVE-2025-49537,0,0,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000
CVE-2025-49538,0,0,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000
CVE-2025-49539,0,0,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000
CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000 CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000
CVE-2025-49540,1,1,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000 CVE-2025-49540,0,0,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000
CVE-2025-49541,1,1,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000 CVE-2025-49541,0,0,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000
CVE-2025-49542,1,1,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000 CVE-2025-49542,0,0,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000
CVE-2025-49543,1,1,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000 CVE-2025-49543,0,0,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000
CVE-2025-49544,1,1,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000 CVE-2025-49544,0,0,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000
CVE-2025-49545,1,1,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000 CVE-2025-49545,0,0,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000
CVE-2025-49546,1,1,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000 CVE-2025-49546,0,0,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000
CVE-2025-49547,1,1,9f057608fd5bded1b3e3d881b8d5b33b5948ad193dc915409d3273384c3360a2,2025-07-08T22:15:27.737000
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000 CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000 CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000 CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000
CVE-2025-49551,1,1,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000 CVE-2025-49551,0,0,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000
CVE-2025-49574,0,0,ec211dbe5543652a4df81f232ea6a683a4d467fc93142407aa7003d8d8ff4016,2025-06-23T20:16:21.633000 CVE-2025-49574,0,0,ec211dbe5543652a4df81f232ea6a683a4d467fc93142407aa7003d8d8ff4016,2025-06-23T20:16:21.633000
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000 CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000 CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000
@ -299665,7 +299705,7 @@ CVE-2025-53338,0,0,69ee0c5b640fcd72e43f5a3a6d7505b4ccd5499b6d733162f15f39655cb80
CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000 CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000
CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000 CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000
CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000 CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000
CVE-2025-53355,1,1,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000 CVE-2025-53355,0,0,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000 CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000 CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000 CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
@ -299703,7 +299743,7 @@ CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29a
CVE-2025-53473,0,0,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000 CVE-2025-53473,0,0,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000
CVE-2025-53478,0,0,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000 CVE-2025-53478,0,0,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000
CVE-2025-53479,0,0,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000 CVE-2025-53479,0,0,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000
CVE-2025-53480,0,1,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000 CVE-2025-53480,0,0,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000
CVE-2025-53481,0,0,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000 CVE-2025-53481,0,0,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000
CVE-2025-53482,0,0,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000 CVE-2025-53482,0,0,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000
CVE-2025-53483,0,0,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000 CVE-2025-53483,0,0,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000
@ -299719,11 +299759,11 @@ CVE-2025-53491,0,0,6b3662c2831fdd8c79ded4454ee2035fa60f94a03054090afb7fd7e68c185
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000 CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000 CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000 CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
CVE-2025-53495,0,1,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000 CVE-2025-53495,0,0,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000
CVE-2025-53496,0,1,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000 CVE-2025-53496,0,0,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000
CVE-2025-53497,0,0,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000 CVE-2025-53497,0,0,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000
CVE-2025-53498,0,1,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000 CVE-2025-53498,0,0,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000
CVE-2025-53499,0,1,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000 CVE-2025-53499,0,0,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000
CVE-2025-53500,0,0,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000 CVE-2025-53500,0,0,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000
CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000 CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000
CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000 CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000
@ -299744,6 +299784,7 @@ CVE-2025-53539,0,0,5db39fcd0a7210d0be83b7c2d14e7c8ed3f3b273c7210a57205be51f0a6b1
CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000 CVE-2025-53540,0,0,68f0d19008b8f949cf7cbae53e1f6ef67fca39bb0fc5628cd655d505d311b69c,2025-07-08T16:18:34.923000
CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000 CVE-2025-53543,0,0,da4e1b5cf6cb8007cd6dfd1396fc489f3840d88a4e59fc523fdbc4c83d5fc208,2025-07-08T16:18:34.923000
CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000 CVE-2025-53545,0,0,ef3d0455098abbefc8b277f85bd071e32e2b46fb49dca2b74733aee634f2df15,2025-07-08T16:18:14.207000
CVE-2025-53547,1,1,0603f19d53a4e8e1ee41784cd64f1b6377de65c88b39bed5a19368f091eb7c70,2025-07-08T22:15:27.897000
CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000 CVE-2025-5356,0,0,230423e916dccb3eed4f4eea6b8b3a9d8afef34a102c6f9d5aed25dc46913046,2025-06-24T15:20:27.113000
CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000 CVE-2025-53566,0,0,454fc69172044556d46b17e70adb6745e5c6362d217f0ee325fd72c5ff2824d8,2025-07-08T16:18:53.607000
CVE-2025-53568,0,0,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000 CVE-2025-53568,0,0,ec672fa14438849d4042331d8f520ecf08d3b5cc6d344f82d58d26ad189f71b5,2025-07-08T16:18:53.607000
@ -300673,7 +300714,7 @@ CVE-2025-6543,0,0,614be473b1a9f0b696f8665a5ce20ebb99b6c34c213be6f11e91a24c2a2ce2
CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000 CVE-2025-6545,0,0,232265ccc6fe056c6abf53601342de9afd636906f2fd3b22c8fe97e99accaff8,2025-06-23T20:16:21.633000
CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000 CVE-2025-6546,0,0,e2ccb0f36404155cf63065e6218ff7146480ba7d5ad20b9847888ed82aa12363,2025-07-08T11:34:27.020000
CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000 CVE-2025-6547,0,0,9faf016e4cd0d979f6fd378ab40d2ecc76b2956dd06a9026d16b0df65d7d2aad,2025-06-23T20:16:21.633000
CVE-2025-6550,0,0,c0a691cea8a5ed699b0d12b82357599196c16b195f2af32ef4c55625a42b68d0,2025-07-07T15:38:38.413000 CVE-2025-6550,0,1,89e239136c37d0091ac7da31fce424150e754df9694a35b76fceef47cee0376e,2025-07-08T22:15:28.053000
CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000 CVE-2025-6551,0,0,2a94174e2614ca3546b6a5e525dcaf472420d11762377d8f50c13a66a36f8364,2025-07-08T14:26:00.507000
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000 CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000 CVE-2025-6554,0,0,890362c519a4357d98514f62cd39fc9e4bb37403cd00a1b3ef610614d19dbf03,2025-07-03T14:36:33.257000
@ -300802,6 +300843,7 @@ CVE-2025-6752,0,0,d618339d30498ab434c65ab8e70ead8372a7351acdadb43706f579edd48b3c
CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000 CVE-2025-6753,0,0,3897c99aad9d809fc80328b995708f5bc4da9d5705cbec93e88e8647b45eee72,2025-06-30T18:38:48.477000
CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000 CVE-2025-6755,0,0,2ed0f7f54c600ed4e147859a7a6dccd680b8f9e751ace8296b2fc7b8585c8e1d,2025-07-07T14:37:41.387000
CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000 CVE-2025-6756,0,0,0cfdb95abe834ccf814ebb67236819ce98902f5c812431ef066dbba054d03826,2025-07-03T15:14:12.767000
CVE-2025-6759,1,1,fd5ad8950faaf00037797969f812bda1b912165b72aa82116a14ba1f59189b19,2025-07-08T22:15:28.213000
CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000 CVE-2025-6761,0,0,e4aa62f203d4ba34beb7bc7552005e1ee7d628b1642e253cda9ca26ecfa6cb7f,2025-06-30T18:38:48.477000
CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000 CVE-2025-6762,0,0,75cd4b1572c25c8bfa181120ae91b7aedff91bf82d0f669f47b2f3f4fec5cad2,2025-06-30T18:38:48.477000
CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000 CVE-2025-6763,0,0,79011f757887077a09a36e14edcb0426409f6ce627f1762247315cb51e05c1de,2025-06-30T18:38:48.477000
@ -300963,8 +301005,8 @@ CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0e
CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000 CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000
CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000 CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000
CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000 CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000
CVE-2025-7030,1,1,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000 CVE-2025-7030,0,0,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000
CVE-2025-7031,1,1,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000 CVE-2025-7031,0,0,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000
CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000 CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000
CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000 CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000
CVE-2025-7053,0,0,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000 CVE-2025-7053,0,0,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000
@ -301092,10 +301134,14 @@ CVE-2025-7188,0,0,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8
CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000 CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000
CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000 CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000
CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000 CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000
CVE-2025-7192,1,1,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000 CVE-2025-7192,0,0,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000
CVE-2025-7193,1,1,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000 CVE-2025-7193,0,0,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000
CVE-2025-7194,1,1,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000 CVE-2025-7194,0,0,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000
CVE-2025-7196,1,1,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000 CVE-2025-7196,0,0,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000
CVE-2025-7197,1,1,d7ef2bbbca6a098b30626d655580ae51f3bb02749fdfc95787b7456aca1ba445,2025-07-08T22:15:28.363000
CVE-2025-7198,1,1,63b79c707b5bfce7c46214c79d7862e8376d7eb74cbc05a4724b43eff8a718c0,2025-07-08T22:15:28.563000
CVE-2025-7199,1,1,b0a8250b4d336e166905e4bc2ac946445847a87b58bca02c2f72af4f009a69fd,2025-07-08T23:15:26.547000
CVE-2025-7200,1,1,3128d4b4efd12d5fee611c128232b2629be04d055967f1d11cd5875056d136cd,2025-07-08T23:15:26.757000
CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000 CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000
CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000 CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000
CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000 CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000

Can't render this file because it is too large.