mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-21 17:41:05 +00:00
Auto-Update: 2025-06-04T12:00:22.911436+00:00
This commit is contained in:
parent
0ddbc5a2a2
commit
637ab4cb75
56
CVE-2018/CVE-2018-251xx/CVE-2018-25112.json
Normal file
56
CVE-2018/CVE-2018-251xx/CVE-2018-25112.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2018-25112",
|
||||
"sourceIdentifier": "info@cert.vde.com",
|
||||
"published": "2025-06-04T10:15:20.380",
|
||||
"lastModified": "2025-06-04T10:15:20.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "An unauthenticated remote attacker may use an uncontrolled resource consumption in the IEC 61131 program of the affected products by creating large amounts of network traffic that needs to be handled by the ILC. This results in a Denial-of-Service of the device."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "info@cert.vde.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-770"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://certvde.com/en/advisories/VDE-2018-012/",
|
||||
"source": "info@cert.vde.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2024-6538",
|
||||
"sourceIdentifier": "secalert@redhat.com",
|
||||
"published": "2024-11-25T07:15:06.187",
|
||||
"lastModified": "2025-05-21T00:15:21.840",
|
||||
"lastModified": "2025-06-04T10:15:21.357",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -56,6 +56,10 @@
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:7863",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/errata/RHSA-2025:8280",
|
||||
"source": "secalert@redhat.com"
|
||||
},
|
||||
{
|
||||
"url": "https://access.redhat.com/security/cve/CVE-2024-6538",
|
||||
"source": "secalert@redhat.com"
|
||||
|
@ -2,52 +2,15 @@
|
||||
"id": "CVE-2025-37782",
|
||||
"sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67",
|
||||
"published": "2025-05-01T14:15:42.163",
|
||||
"lastModified": "2025-05-02T13:53:20.943",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-06-04T11:15:21.673",
|
||||
"vulnStatus": "Rejected",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In the Linux kernel, the following vulnerability has been resolved:\n\nhfs/hfsplus: fix slab-out-of-bounds in hfs_bnode_read_key\n\nSyzbot reported an issue in hfs subsystem:\n\nBUG: KASAN: slab-out-of-bounds in memcpy_from_page include/linux/highmem.h:423 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read fs/hfs/bnode.c:35 [inline]\nBUG: KASAN: slab-out-of-bounds in hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\nWrite of size 94 at addr ffff8880123cd100 by task syz-executor237/5102\n\nCall Trace:\n <TASK>\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:377 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:488\n kasan_report+0x143/0x180 mm/kasan/report.c:601\n kasan_check_range+0x282/0x290 mm/kasan/generic.c:189\n __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106\n memcpy_from_page include/linux/highmem.h:423 [inline]\n hfs_bnode_read fs/hfs/bnode.c:35 [inline]\n hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70\n hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159\n hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118\n hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232\n vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257\n do_mkdirat+0x264/0x3a0 fs/namei.c:4280\n __do_sys_mkdir fs/namei.c:4300 [inline]\n __se_sys_mkdir fs/namei.c:4298 [inline]\n __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fbdd6057a99\n\nAdd a check for key length in hfs_bnode_read_key to prevent\nout-of-bounds memory access. If the key length is invalid, the\nkey buffer is cleared, improving stability and reliability."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
"value": "En el kernel de Linux, se ha resuelto la siguiente vulnerabilidad: hfs/hfsplus: se corrige slab-out-of-bounds en hfs_bnode_read_key Syzbot inform\u00f3 de un problema en el subsistema hfs: ERROR: KASAN: slab-out-of-bounds en memcpy_from_page include/linux/highmem.h:423 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en hfs_bnode_read fs/hfs/bnode.c:35 [en l\u00ednea] ERROR: KASAN: slab-out-of-bounds en hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70 Escritura de tama\u00f1o 94 en la direcci\u00f3n ffff8880123cd100 por la tarea syz-executor237/5102 Rastreo de llamadas: __dump_stack lib/dump_stack.c:94 [en l\u00ednea] dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120 print_address_description mm/kasan/report.c:377 [en l\u00ednea] print_report+0x169/0x550 mm/kasan/report.c:488 kasan_report+0x143/0x180 mm/kasan/report.c:601 kasan_check_range+0x282/0x290 mm/kasan/generic.c:189 __asan_memcpy+0x40/0x70 mm/kasan/shadow.c:106 memcpy_from_page include/linux/highmem.h:423 [en l\u00ednea] hfs_bnode_read fs/hfs/bnode.c:35 [en l\u00ednea] hfs_bnode_read_key+0x314/0x450 fs/hfs/bnode.c:70 hfs_brec_insert+0x7f3/0xbd0 fs/hfs/brec.c:159 hfs_cat_create+0x41d/0xa50 fs/hfs/catalog.c:118 hfs_mkdir+0x6c/0xe0 fs/hfs/dir.c:232 vfs_mkdir+0x2f9/0x4f0 fs/namei.c:4257 do_mkdirat+0x264/0x3a0 fs/namei.c:4280 __do_sys_mkdir fs/namei.c:4300 [en l\u00ednea] __se_sys_mkdir fs/namei.c:4298 [en l\u00ednea] __x64_sys_mkdir+0x6c/0x80 fs/namei.c:4298 do_syscall_x64 arch/x86/entry/common.c:52 [en l\u00ednea] do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f RIP: 0033:0x7fbdd6057a99 Se ha a\u00f1adido una comprobaci\u00f3n de la longitud de la clave en hfs_bnode_read_key para evitar el acceso a memoria fuera de los l\u00edmites. Si la longitud de la clave no es v\u00e1lida, se borra el b\u00fafer de claves, lo que mejora la estabilidad y la fiabilidad."
|
||||
"value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"references": [
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/0296f9733543c7c8e666e69da743cfffd32dd805",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/8060afd77761eac2048db12fb0510d76ce0cf1f3",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/84e8719c087e68c967975b78e67be54f697c957f",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9c93fb4ad8d3b730afe1a09949ebbea64d4f60eb",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/9f77aa584a659b21211a794e53522e6fb16d4a16",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/a33c035df01d1e008874607da74bf7cf45152f47",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/bb5e07cb927724e0b47be371fa081141cfb14414",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
},
|
||||
{
|
||||
"url": "https://git.kernel.org/stable/c/f6651c04191d49907d40f0891bbe51ef9703c792",
|
||||
"source": "416baaa9-dc9f-4396-8d5f-8c081fb06d67"
|
||||
}
|
||||
]
|
||||
"references": []
|
||||
}
|
145
CVE-2025/CVE-2025-55xx/CVE-2025-5583.json
Normal file
145
CVE-2025/CVE-2025-55xx/CVE-2025-5583.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5583",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-04T10:15:21.640",
|
||||
"lastModified": "2025-06-04T10:15:21.640",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability classified as critical has been found in CodeAstro Real Estate Management System 1.0. Affected is an unknown function of the file /register.php. The manipulation leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://codeastro.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/YZS17/CVE/blob/main/CodeAstro_Real_Estate_Management_System/sqli_register.php.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311040",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311040",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588822",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-55xx/CVE-2025-5584.json
Normal file
145
CVE-2025/CVE-2025-55xx/CVE-2025-5584.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5584",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-04T10:15:21.870",
|
||||
"lastModified": "2025-06-04T10:15:21.870",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in PHPGurukul Hospital Management System 4.0. It has been classified as problematic. Affected is an unknown function of the file /doctor/edit-patient.php?editid=2 of the component POST Parameter Handler. The manipulation of the argument patname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:M/C:N/I:P/A:N",
|
||||
"baseScore": 3.3,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "MULTIPLE",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"baseSeverity": "LOW",
|
||||
"exploitabilityScore": 6.4,
|
||||
"impactScore": 2.9,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-94"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Ant1sec-ops/Hospital-management-Systemv4.0-Stored-XSS/blob/main/stored-xss-exploit.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://phpgurukul.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311046",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311046",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.588828",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-56xx/CVE-2025-5601.json
Normal file
60
CVE-2025/CVE-2025-56xx/CVE-2025-5601.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-5601",
|
||||
"sourceIdentifier": "cve@gitlab.com",
|
||||
"published": "2025-06-04T11:15:22.110",
|
||||
"lastModified": "2025-06-04T11:15:22.110",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Column handling crashes in Wireshark 4.4.0 to 4.4.6 and 4.2.0 to 4.2.12 allows denial of service via packet injection or crafted capture file"
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@gitlab.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitlab.com/wireshark/wireshark/-/issues/20509",
|
||||
"source": "cve@gitlab.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wireshark.org/security/wnpa-sec-2025-02.html",
|
||||
"source": "cve@gitlab.com"
|
||||
}
|
||||
]
|
||||
}
|
32
README.md
32
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-04T10:00:20.957487+00:00
|
||||
2025-06-04T12:00:22.911436+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-04T09:15:21.227000+00:00
|
||||
2025-06-04T11:15:22.110000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,35 +33,25 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
296445
|
||||
296449
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `4`
|
||||
|
||||
- [CVE-2024-13967](CVE-2024/CVE-2024-139xx/CVE-2024-13967.json) (`2025-06-04T08:15:21.367`)
|
||||
- [CVE-2025-27444](CVE-2025/CVE-2025-274xx/CVE-2025-27444.json) (`2025-06-04T08:15:21.613`)
|
||||
- [CVE-2025-47724](CVE-2025/CVE-2025-477xx/CVE-2025-47724.json) (`2025-06-04T08:15:21.867`)
|
||||
- [CVE-2025-47725](CVE-2025/CVE-2025-477xx/CVE-2025-47725.json) (`2025-06-04T08:15:22.057`)
|
||||
- [CVE-2025-47726](CVE-2025/CVE-2025-477xx/CVE-2025-47726.json) (`2025-06-04T08:15:22.190`)
|
||||
- [CVE-2025-47727](CVE-2025/CVE-2025-477xx/CVE-2025-47727.json) (`2025-06-04T08:15:22.320`)
|
||||
- [CVE-2025-47728](CVE-2025/CVE-2025-477xx/CVE-2025-47728.json) (`2025-06-04T08:15:22.453`)
|
||||
- [CVE-2025-5482](CVE-2025/CVE-2025-54xx/CVE-2025-5482.json) (`2025-06-04T08:15:22.613`)
|
||||
- [CVE-2025-5576](CVE-2025/CVE-2025-55xx/CVE-2025-5576.json) (`2025-06-04T08:15:22.810`)
|
||||
- [CVE-2025-5577](CVE-2025/CVE-2025-55xx/CVE-2025-5577.json) (`2025-06-04T08:15:22.997`)
|
||||
- [CVE-2025-5578](CVE-2025/CVE-2025-55xx/CVE-2025-5578.json) (`2025-06-04T08:15:23.177`)
|
||||
- [CVE-2025-5579](CVE-2025/CVE-2025-55xx/CVE-2025-5579.json) (`2025-06-04T08:15:23.360`)
|
||||
- [CVE-2025-5580](CVE-2025/CVE-2025-55xx/CVE-2025-5580.json) (`2025-06-04T09:15:20.800`)
|
||||
- [CVE-2025-5581](CVE-2025/CVE-2025-55xx/CVE-2025-5581.json) (`2025-06-04T09:15:21.010`)
|
||||
- [CVE-2025-5582](CVE-2025/CVE-2025-55xx/CVE-2025-5582.json) (`2025-06-04T09:15:21.227`)
|
||||
- [CVE-2018-25112](CVE-2018/CVE-2018-251xx/CVE-2018-25112.json) (`2025-06-04T10:15:20.380`)
|
||||
- [CVE-2025-5583](CVE-2025/CVE-2025-55xx/CVE-2025-5583.json) (`2025-06-04T10:15:21.640`)
|
||||
- [CVE-2025-5584](CVE-2025/CVE-2025-55xx/CVE-2025-5584.json) (`2025-06-04T10:15:21.870`)
|
||||
- [CVE-2025-5601](CVE-2025/CVE-2025-56xx/CVE-2025-5601.json) (`2025-06-04T11:15:22.110`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `1`
|
||||
Recently modified CVEs: `2`
|
||||
|
||||
- [CVE-2025-37832](CVE-2025/CVE-2025-378xx/CVE-2025-37832.json) (`2025-06-04T08:15:21.743`)
|
||||
- [CVE-2024-6538](CVE-2024/CVE-2024-65xx/CVE-2024-6538.json) (`2025-06-04T10:15:21.357`)
|
||||
- [CVE-2025-37782](CVE-2025/CVE-2025-377xx/CVE-2025-37782.json) (`2025-06-04T11:15:21.673`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
40
_state.csv
40
_state.csv
@ -121454,6 +121454,7 @@ CVE-2018-25108,0,0,b20ffbb6cbdeced293a2d0d5632cf118c9bcd4427f34608769eddf9c049b9
|
||||
CVE-2018-25109,0,0,78a6fcfa9783d17890c8ccdbf5bd43dceffab865f734cb93193e2f03c25430f9,2025-03-23T23:15:13.060000
|
||||
CVE-2018-25110,0,0,abecf77d0fbcf00bec56ae07fcdaac59d13802e5d641bed90dfb73d9379f33a8,2025-05-23T15:54:42.643000
|
||||
CVE-2018-25111,0,0,d1d17366475e485173a544457112923af9883e4ce6e5838607a959f5a4b802a1,2025-06-02T17:32:17.397000
|
||||
CVE-2018-25112,1,1,93ad48b186c456e0fd81f82a9c15fc00180f9fe62522f679230025a22ce63ee3,2025-06-04T10:15:20.380000
|
||||
CVE-2018-2515,0,0,5409b099d6b1ad12de2273669dad1cdf61ce6e1c2e305b93396a548635b48aa4,2023-11-07T02:57:57.887000
|
||||
CVE-2018-2560,0,0,64c0ce8dd86b8cd41f028fc0faeb4c2703b3a3d6c99b5cfb7e065de6e8a10aab,2024-11-21T04:03:56.060000
|
||||
CVE-2018-2561,0,0,03752647d2e63906688e002ddaaa7e85aba13094709fdf81fa6e8215efd59a07,2024-11-21T04:03:56.197000
|
||||
@ -249133,7 +249134,7 @@ CVE-2024-13962,0,0,ea9d81d91a348a1fccf0a29b3d54407f74eaf1ed332ca23dd52e5162f21cb
|
||||
CVE-2024-13964,0,0,0b3cec59b44d58c537c140b76cb5eed52f77b988e404c33ca119bbcb44531c40,2025-05-17T20:15:19.230000
|
||||
CVE-2024-13965,0,0,696266c1e615339e2c74184825c7869048cb34652d675d1bb1be5959dc30273e,2025-05-17T20:15:19.317000
|
||||
CVE-2024-13966,0,0,1e7c7434322ae48a12d12060d00ccb0202329621b4c00fb67abd63b41233b655,2025-05-28T19:15:35.940000
|
||||
CVE-2024-13967,1,1,88a62faac054a08e568cb0e89617f4c9ca6f0d96cde36b43b9933345b083dbfc,2025-06-04T08:15:21.367000
|
||||
CVE-2024-13967,0,0,88a62faac054a08e568cb0e89617f4c9ca6f0d96cde36b43b9933345b083dbfc,2025-06-04T08:15:21.367000
|
||||
CVE-2024-1397,0,0,b23e8b9ccb5706ad3f8d257df0efb1d8013c2af60938dfd6b0df8c51fda39522,2025-01-22T17:41:19.017000
|
||||
CVE-2024-1398,0,0,9645ba9f8586ede4d8e9304631788266d0cde74989f61af36e6ddca7859998d4,2025-01-08T18:39:21.643000
|
||||
CVE-2024-1399,0,0,de4ae2e68321a6c15c8c7d567274d914b003ef22dbc953f97581fd2a2e98f996,2024-11-21T08:50:30.073000
|
||||
@ -279114,7 +279115,7 @@ CVE-2024-6533,0,0,7c76cd0497295bcea8ddaf17ea367bd3231a092d4f1d355ad959ac1bbed5a9
|
||||
CVE-2024-6534,0,0,77773ba8637f01892ca3f6641fe8442e5c6280672a181b114b53032c7b4aca6d,2025-05-19T19:15:47.540000
|
||||
CVE-2024-6535,0,0,44388289212b949983bbcb08fc4f387d14a7864b80be8ec8b5ccdce879cce735,2024-11-21T09:49:49.560000
|
||||
CVE-2024-6536,0,0,4e1867493e6f7c1e950c15aa2768a98ac72cddbf5d06c6d2259320ca6542fdf4,2024-11-21T09:49:50.537000
|
||||
CVE-2024-6538,0,0,2c696936cc4fa31d9ffe13c04e6d402da324c38b24c1ee7e007ddef2fa798bdc,2025-05-21T00:15:21.840000
|
||||
CVE-2024-6538,0,1,f7440ea0b8cf2901f701aeb52d59c6d0dcf7f1ec4b01d2832ad6e6882f217cd6,2025-06-04T10:15:21.357000
|
||||
CVE-2024-6539,0,0,488f82b4dd195018a4571a7b41599ab86771c19553aea6769341658d3043c227,2024-11-21T09:49:50.707000
|
||||
CVE-2024-6540,0,0,f3ea6a455e292a17968899748da95526cfa3d10fdcac7853f32fce07f60e60be,2024-11-21T09:49:50.857000
|
||||
CVE-2024-6542,0,0,95c08c38ec0cfe53af1e3f2fc6b95f2c5e43a181678f8155f2d77a836dccc44c,2024-11-21T09:49:50.997000
|
||||
@ -289337,7 +289338,7 @@ CVE-2025-27440,0,0,86277272131892140b431c748dacaa4d43e60fedf1d6315607fc09340bd3b
|
||||
CVE-2025-27441,0,0,79018b3b06a9e1f169848e8cfe5684a88b8ec611e0eecb9ae49cfed5e1cd7b23,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501ed9,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27444,1,1,95dd66321c35391a8cf3b58a9acd74b89e40b0b508c1c51e78cb5304ac2a9740,2025-06-04T08:15:21.613000
|
||||
CVE-2025-27444,0,0,95dd66321c35391a8cf3b58a9acd74b89e40b0b508c1c51e78cb5304ac2a9740,2025-06-04T08:15:21.613000
|
||||
CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000
|
||||
CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000
|
||||
@ -293194,7 +293195,7 @@ CVE-2025-37778,0,0,3cdbb566719b7ca2d436a75de7cdf65e40806d44d237a4dd299477c86f354
|
||||
CVE-2025-37779,0,0,f7f8b725e52c1609c167c7dfd7bfbee40482c20359fe76997973fd849c7a90a1,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37780,0,0,cd0a2af961fcad9423a173231341cd5d762f4739a678c5c5673333bb1f120eef,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37781,0,0,a44bb8b14a579ae4d75f6eef6cd1cba50d00f809da0416b4ad5fa1037f91c981,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37782,0,0,3f91690a6d840fb23bef57135c4978c954a5f146b8cef210a2710671986ade26,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37782,0,1,5409ef4569fab054a1288c9a894b055822ce58fa6042171764652b240fa95823,2025-06-04T11:15:21.673000
|
||||
CVE-2025-37783,0,0,12e395808dd0a36b81c3ff441bbeffe9f373081c146e0a0a9e02a00a2ab9ed3b,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37784,0,0,096244f3457f9523c5220f8ad5cef1c295d74e16085b7f5e0d853f3738dafc6e,2025-05-02T13:53:20.943000
|
||||
CVE-2025-37785,0,0,4e697d6d82e7172f54476520bd720db8b8bd91cd75962c19cef18481d74ee68c,2025-05-02T07:16:03.590000
|
||||
@ -293248,7 +293249,7 @@ CVE-2025-37829,0,0,b003e966d7ca0f9f403c50eb7d8a02cd16d481323fbfe0f5fb10e449ad7ea
|
||||
CVE-2025-3783,0,0,08564e7625cce7923d54746f30fbc8f13bf12d9607faa6a7346084b96420b3f3,2025-04-23T18:03:35.193000
|
||||
CVE-2025-37830,0,0,7871ba7016e07cda0ac996bbbdb936f9c839fd7180e395b8e224083c0952e61c,2025-05-08T14:39:09.683000
|
||||
CVE-2025-37831,0,0,8add769293519eb649322773bbc36e2896aa76e7c7f2f9866f01d932e01dd3bf,2025-05-08T14:39:09.683000
|
||||
CVE-2025-37832,0,1,86c7088f302d72ddeddbef873d9d9fd22529524a30056ad131e7ae4fb85e4095,2025-06-04T08:15:21.743000
|
||||
CVE-2025-37832,0,0,86c7088f302d72ddeddbef873d9d9fd22529524a30056ad131e7ae4fb85e4095,2025-06-04T08:15:21.743000
|
||||
CVE-2025-37833,0,0,57554fe25fe5dbfac4d5daaf77cd500fee4ccf5b4933d414b3d8ebad075147d9,2025-05-08T14:39:09.683000
|
||||
CVE-2025-37834,0,0,ab8baa5c719f3f2768d0dc997e843a3b224813e5d8ec32283bddca1456f04cf9,2025-05-08T14:39:09.683000
|
||||
CVE-2025-37835,0,0,6725c148877e87dd1c04a498b1edde1ac8508bce4a2ad81f2426f150e5ad4dca,2025-05-10T14:15:32.750000
|
||||
@ -295506,11 +295507,11 @@ CVE-2025-47709,0,0,9c00b271893f53d1f52294cb240e92548326ebdfcea3825170f6a366a64bc
|
||||
CVE-2025-4771,0,0,098fa6c5f50ab00bca1e41fbaecb02800df7623ac7bf2fda48146206c10d346e,2025-05-21T14:16:02.380000
|
||||
CVE-2025-47710,0,0,3861e04e9e65074d020efa7dab9e00a25ecb80cf10fb272d3ea074fb3b627c14,2025-05-19T15:15:24.580000
|
||||
CVE-2025-4772,0,0,d0f3fa4362a8236e85b8ffd939fd0423a16232ac9a4ecc1b20eb2790c7640e3f,2025-05-21T20:59:39.237000
|
||||
CVE-2025-47724,1,1,356662c92cfe1531405b3dc36737a94136a96b945656bce7d35d9ff9a900d454,2025-06-04T08:15:21.867000
|
||||
CVE-2025-47725,1,1,9308ff645f7d41a400c58e2d24a45e8d8369b5c840bb3b3d3898e81a9608c7b8,2025-06-04T08:15:22.057000
|
||||
CVE-2025-47726,1,1,0171f1f25c67f0b9f6a26634c482206ad0694d14a0af6538135c408007afe6d1,2025-06-04T08:15:22.190000
|
||||
CVE-2025-47727,1,1,0a58d7aff84a46074df0f158b644d00ecdc657301b54ecb30dfd1ac7b7fca595,2025-06-04T08:15:22.320000
|
||||
CVE-2025-47728,1,1,4c0ef4dad5be6dd03712130b45816586981223bdfefdc0ada7b3205a22d096ae,2025-06-04T08:15:22.453000
|
||||
CVE-2025-47724,0,0,356662c92cfe1531405b3dc36737a94136a96b945656bce7d35d9ff9a900d454,2025-06-04T08:15:21.867000
|
||||
CVE-2025-47725,0,0,9308ff645f7d41a400c58e2d24a45e8d8369b5c840bb3b3d3898e81a9608c7b8,2025-06-04T08:15:22.057000
|
||||
CVE-2025-47726,0,0,0171f1f25c67f0b9f6a26634c482206ad0694d14a0af6538135c408007afe6d1,2025-06-04T08:15:22.190000
|
||||
CVE-2025-47727,0,0,0a58d7aff84a46074df0f158b644d00ecdc657301b54ecb30dfd1ac7b7fca595,2025-06-04T08:15:22.320000
|
||||
CVE-2025-47728,0,0,4c0ef4dad5be6dd03712130b45816586981223bdfefdc0ada7b3205a22d096ae,2025-06-04T08:15:22.453000
|
||||
CVE-2025-47729,0,0,5840dd56191421d2692f93cc2a1893a68781531005d1e7155e40c9e73a0b9865,2025-05-14T13:12:53.603000
|
||||
CVE-2025-4773,0,0,f64a68d0e35e414617bee17967e5c3c9909f1d1c34fed1a1c8d53f16a98c123a,2025-05-21T14:34:08.967000
|
||||
CVE-2025-47730,0,0,32919bd9d895e6a4d64320c41f6d81f839bd7e464e3e623f1b4fc5607c47e300,2025-05-08T14:39:09.683000
|
||||
@ -296380,7 +296381,7 @@ CVE-2025-5445,0,0,4170f3c2f537d54cec187b705ba4828958c100062593b53f1a91ca989cc07f
|
||||
CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a192,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
|
||||
CVE-2025-5482,1,1,83d0f6229de344a3ff87ac74149e35d8119280f36f9106a32549ab2ab6965475,2025-06-04T08:15:22.613000
|
||||
CVE-2025-5482,0,0,83d0f6229de344a3ff87ac74149e35d8119280f36f9106a32549ab2ab6965475,2025-06-04T08:15:22.613000
|
||||
CVE-2025-5492,0,0,b5038878420625bb26f8489e550a4b7b6eed1512f61db614ac007c24853837c9,2025-06-03T11:15:21.023000
|
||||
CVE-2025-5493,0,0,7c4c7427ac4f478c1fac76ad33eb9aa6e606061e63893081420b4dcedc256f44,2025-06-03T14:15:51.033000
|
||||
CVE-2025-5495,0,0,43edca9627a89460bd01070c801d65887312b95c9d61a9db86524fe113b90a84,2025-06-03T14:15:51.170000
|
||||
@ -296437,10 +296438,13 @@ CVE-2025-5572,0,0,b13d6d006dd98b8fc6e0aea31b7a364dc6a370978231e3a68f72d5508d2710
|
||||
CVE-2025-5573,0,0,e11ff868d382d82e3502f73fbfa061e34c3bda72aa1c8eb9eac6468c7d5caa34,2025-06-04T06:15:22.677000
|
||||
CVE-2025-5574,0,0,1a8a59e1fb49ea78ea53ddec9638a192402502820719c70c927f5ed7e4172f18,2025-06-04T07:15:23.060000
|
||||
CVE-2025-5575,0,0,b4f360ded878f941dc681bf7e45141f9ee1edc00457c2628bd2b2982d6c479ae,2025-06-04T07:15:23.533000
|
||||
CVE-2025-5576,1,1,b1312e317aef6bf56eb3237450f51695f7e490227f79f1ad00aa7861404534b5,2025-06-04T08:15:22.810000
|
||||
CVE-2025-5577,1,1,9738c6c3077ef501d50cae557b808f7cffe5585a58c8fa527c752dc09e05afef,2025-06-04T08:15:22.997000
|
||||
CVE-2025-5578,1,1,b5efa5a302f1ef5f80e55262ac516b04a64a1d4e4d49c4848d2c63b7e67fceff,2025-06-04T08:15:23.177000
|
||||
CVE-2025-5579,1,1,b4ef0c7a641494a464cc35a23fba1574fa686d3a9e41f988bdcc4719d164da35,2025-06-04T08:15:23.360000
|
||||
CVE-2025-5580,1,1,866378ce3d7c4dfdb774e09456e6b9f17f01b11d3f3b25f9a6fc31dd4fd424c1,2025-06-04T09:15:20.800000
|
||||
CVE-2025-5581,1,1,cb5dd8bd11a61c024e6c526695b7a9f04a3a94d4060520f2e4a1660075297d59,2025-06-04T09:15:21.010000
|
||||
CVE-2025-5582,1,1,dd333dc84f994e81fa23f36c784f5640cb66811571538f536d6a0a40a853a20d,2025-06-04T09:15:21.227000
|
||||
CVE-2025-5576,0,0,b1312e317aef6bf56eb3237450f51695f7e490227f79f1ad00aa7861404534b5,2025-06-04T08:15:22.810000
|
||||
CVE-2025-5577,0,0,9738c6c3077ef501d50cae557b808f7cffe5585a58c8fa527c752dc09e05afef,2025-06-04T08:15:22.997000
|
||||
CVE-2025-5578,0,0,b5efa5a302f1ef5f80e55262ac516b04a64a1d4e4d49c4848d2c63b7e67fceff,2025-06-04T08:15:23.177000
|
||||
CVE-2025-5579,0,0,b4ef0c7a641494a464cc35a23fba1574fa686d3a9e41f988bdcc4719d164da35,2025-06-04T08:15:23.360000
|
||||
CVE-2025-5580,0,0,866378ce3d7c4dfdb774e09456e6b9f17f01b11d3f3b25f9a6fc31dd4fd424c1,2025-06-04T09:15:20.800000
|
||||
CVE-2025-5581,0,0,cb5dd8bd11a61c024e6c526695b7a9f04a3a94d4060520f2e4a1660075297d59,2025-06-04T09:15:21.010000
|
||||
CVE-2025-5582,0,0,dd333dc84f994e81fa23f36c784f5640cb66811571538f536d6a0a40a853a20d,2025-06-04T09:15:21.227000
|
||||
CVE-2025-5583,1,1,d6c5ab1288fdf4d02127f96993f7a6a2045c26778c2ff6577da02cbee38dfeba,2025-06-04T10:15:21.640000
|
||||
CVE-2025-5584,1,1,595d69f785fa4180f25c9f219bcece6562704ec6ce02a92df1130f12b60b3339,2025-06-04T10:15:21.870000
|
||||
CVE-2025-5601,1,1,4a7648bdda6af4e29368e644b4aeae144c2d9f1f77b8ae4a2205a48d15208759,2025-06-04T11:15:22.110000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user