Auto-Update: 2025-06-25T23:55:26.139521+00:00

This commit is contained in:
cad-safe-bot 2025-06-25 23:59:04 +00:00
parent 92599e0796
commit 70cd253cf4
29 changed files with 1993 additions and 91 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-6443",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:20.960",
"lastModified": "2025-06-25T22:15:20.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of remote IP addresses when processing VXLAN traffic. The issue results from the lack of validation of the remote IP address against configured values prior to allowing ingress traffic into the internal network. An attacker can leverage this vulnerability to gain access to internal network resources. Was ZDI-CAN-26415."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-424/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6640",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.107",
"lastModified": "2025-06-25T22:15:21.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26527."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-425/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6641",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.237",
"lastModified": "2025-06-25T22:15:21.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26528."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-426/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6642",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.363",
"lastModified": "2025-06-25T22:15:21.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26530."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-427/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6643",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.487",
"lastModified": "2025-06-25T22:15:21.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26532."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-428/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6644",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.617",
"lastModified": "2025-06-25T22:15:21.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26536."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-429/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6645",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.743",
"lastModified": "2025-06-25T22:15:21.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26642."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-430/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6646",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.887",
"lastModified": "2025-06-25T22:15:21.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26643."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-431/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6647",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.027",
"lastModified": "2025-06-25T22:15:22.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26644."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-432/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6648",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.160",
"lastModified": "2025-06-25T22:15:22.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26671."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-433/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6649",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.307",
"lastModified": "2025-06-25T22:15:22.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26709."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-434/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6650",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.443",
"lastModified": "2025-06-25T22:15:22.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26712."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-435/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6651",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.580",
"lastModified": "2025-06-25T22:15:22.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26713."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-436/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6652",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.720",
"lastModified": "2025-06-25T22:15:22.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26724."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-437/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6653",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.870",
"lastModified": "2025-06-25T22:15:22.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26726."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-438/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6654",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.047",
"lastModified": "2025-06-25T22:15:23.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26729."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-439/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6655",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.187",
"lastModified": "2025-06-25T22:15:23.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26730."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-440/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6656",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.330",
"lastModified": "2025-06-25T22:15:23.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26731."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-441/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6657",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.467",
"lastModified": "2025-06-25T22:15:23.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26732."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-442/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6658",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.597",
"lastModified": "2025-06-25T22:15:23.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26733."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-444/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6659",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.740",
"lastModified": "2025-06-25T22:15:23.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26734."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-445/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6660",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.863",
"lastModified": "2025-06-25T22:15:23.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor GIF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26763."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-443/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6661",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.997",
"lastModified": "2025-06-25T22:15:23.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor App Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of App objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26823."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-446/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6662",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:24.127",
"lastModified": "2025-06-25T22:15:24.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26985."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-447/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6667",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T22:15:24.280",
"lastModified": "2025-06-25T22:15:24.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Car Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add_cars.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/zzb1388/cve/issues/12",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313880",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313880",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602325",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T22:15:24.450",
"lastModified": "2025-06-25T22:15:24.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /php_action/fetchSelectedBrand.php. The manipulation of the argument brandId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/lijingze-eng/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313881",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313881",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T23:15:21.310",
"lastModified": "2025-06-25T23:15:21.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key\r . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-320"
},
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://github.com/gooaclok819/sublinkX/commit/778d26aef723daa58df98c8060c43f5bf5d1b10b",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/issues/69",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/releases/tag/1.9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313882",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313882",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602369",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-25T22:00:24.166046+00:00
2025-06-25T23:55:26.139521+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-25T21:15:21.703000+00:00
2025-06-25T23:15:21.310000+00:00
```
### Last Data Feed Release
@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
299351
299378
```
### CVEs added in the last Commit
Recently added CVEs: `4`
Recently added CVEs: `27`
- [CVE-2025-36038](CVE-2025/CVE-2025-360xx/CVE-2025-36038.json) (`2025-06-25T21:15:20.447`)
- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-25T20:15:23.927`)
- [CVE-2025-6664](CVE-2025/CVE-2025-66xx/CVE-2025-6664.json) (`2025-06-25T21:15:21.520`)
- [CVE-2025-6665](CVE-2025/CVE-2025-66xx/CVE-2025-6665.json) (`2025-06-25T21:15:21.703`)
- [CVE-2025-6641](CVE-2025/CVE-2025-66xx/CVE-2025-6641.json) (`2025-06-25T22:15:21.237`)
- [CVE-2025-6642](CVE-2025/CVE-2025-66xx/CVE-2025-6642.json) (`2025-06-25T22:15:21.363`)
- [CVE-2025-6643](CVE-2025/CVE-2025-66xx/CVE-2025-6643.json) (`2025-06-25T22:15:21.487`)
- [CVE-2025-6644](CVE-2025/CVE-2025-66xx/CVE-2025-6644.json) (`2025-06-25T22:15:21.617`)
- [CVE-2025-6645](CVE-2025/CVE-2025-66xx/CVE-2025-6645.json) (`2025-06-25T22:15:21.743`)
- [CVE-2025-6646](CVE-2025/CVE-2025-66xx/CVE-2025-6646.json) (`2025-06-25T22:15:21.887`)
- [CVE-2025-6647](CVE-2025/CVE-2025-66xx/CVE-2025-6647.json) (`2025-06-25T22:15:22.027`)
- [CVE-2025-6648](CVE-2025/CVE-2025-66xx/CVE-2025-6648.json) (`2025-06-25T22:15:22.160`)
- [CVE-2025-6649](CVE-2025/CVE-2025-66xx/CVE-2025-6649.json) (`2025-06-25T22:15:22.307`)
- [CVE-2025-6650](CVE-2025/CVE-2025-66xx/CVE-2025-6650.json) (`2025-06-25T22:15:22.443`)
- [CVE-2025-6651](CVE-2025/CVE-2025-66xx/CVE-2025-6651.json) (`2025-06-25T22:15:22.580`)
- [CVE-2025-6652](CVE-2025/CVE-2025-66xx/CVE-2025-6652.json) (`2025-06-25T22:15:22.720`)
- [CVE-2025-6653](CVE-2025/CVE-2025-66xx/CVE-2025-6653.json) (`2025-06-25T22:15:22.870`)
- [CVE-2025-6654](CVE-2025/CVE-2025-66xx/CVE-2025-6654.json) (`2025-06-25T22:15:23.047`)
- [CVE-2025-6655](CVE-2025/CVE-2025-66xx/CVE-2025-6655.json) (`2025-06-25T22:15:23.187`)
- [CVE-2025-6656](CVE-2025/CVE-2025-66xx/CVE-2025-6656.json) (`2025-06-25T22:15:23.330`)
- [CVE-2025-6657](CVE-2025/CVE-2025-66xx/CVE-2025-6657.json) (`2025-06-25T22:15:23.467`)
- [CVE-2025-6658](CVE-2025/CVE-2025-66xx/CVE-2025-6658.json) (`2025-06-25T22:15:23.597`)
- [CVE-2025-6659](CVE-2025/CVE-2025-66xx/CVE-2025-6659.json) (`2025-06-25T22:15:23.740`)
- [CVE-2025-6660](CVE-2025/CVE-2025-66xx/CVE-2025-6660.json) (`2025-06-25T22:15:23.863`)
- [CVE-2025-6661](CVE-2025/CVE-2025-66xx/CVE-2025-6661.json) (`2025-06-25T22:15:23.997`)
- [CVE-2025-6662](CVE-2025/CVE-2025-66xx/CVE-2025-6662.json) (`2025-06-25T22:15:24.127`)
- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-25T22:15:24.280`)
- [CVE-2025-6668](CVE-2025/CVE-2025-66xx/CVE-2025-6668.json) (`2025-06-25T22:15:24.450`)
- [CVE-2025-6669](CVE-2025/CVE-2025-66xx/CVE-2025-6669.json) (`2025-06-25T23:15:21.310`)
### CVEs modified in the last Commit
Recently modified CVEs: `53`
Recently modified CVEs: `0`
- [CVE-2024-0769](CVE-2024/CVE-2024-07xx/CVE-2024-0769.json) (`2025-06-25T20:15:22.693`)
- [CVE-2024-11847](CVE-2024/CVE-2024-118xx/CVE-2024-11847.json) (`2025-06-25T20:43:39.567`)
- [CVE-2024-25617](CVE-2024/CVE-2024-256xx/CVE-2024-25617.json) (`2025-06-25T20:51:35.437`)
- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2025-06-25T20:24:12.743`)
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-06-25T20:15:23.737`)
- [CVE-2025-26909](CVE-2025/CVE-2025-269xx/CVE-2025-26909.json) (`2025-06-25T20:47:07.753`)
- [CVE-2025-45055](CVE-2025/CVE-2025-450xx/CVE-2025-45055.json) (`2025-06-25T20:24:56.750`)
- [CVE-2025-5729](CVE-2025/CVE-2025-57xx/CVE-2025-5729.json) (`2025-06-25T20:41:36.720`)
- [CVE-2025-5881](CVE-2025/CVE-2025-58xx/CVE-2025-5881.json) (`2025-06-25T20:26:45.010`)
- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-25T20:07:04.093`)
- [CVE-2025-6368](CVE-2025/CVE-2025-63xx/CVE-2025-6368.json) (`2025-06-25T20:09:17.983`)
- [CVE-2025-6369](CVE-2025/CVE-2025-63xx/CVE-2025-6369.json) (`2025-06-25T20:09:28.010`)
- [CVE-2025-6370](CVE-2025/CVE-2025-63xx/CVE-2025-6370.json) (`2025-06-25T20:09:39.790`)
- [CVE-2025-6371](CVE-2025/CVE-2025-63xx/CVE-2025-6371.json) (`2025-06-25T20:09:48.163`)
- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-25T20:09:56.243`)
- [CVE-2025-6373](CVE-2025/CVE-2025-63xx/CVE-2025-6373.json) (`2025-06-25T20:10:16.027`)
- [CVE-2025-6374](CVE-2025/CVE-2025-63xx/CVE-2025-6374.json) (`2025-06-25T20:10:23.920`)
- [CVE-2025-6394](CVE-2025/CVE-2025-63xx/CVE-2025-6394.json) (`2025-06-25T20:12:10.560`)
- [CVE-2025-6399](CVE-2025/CVE-2025-63xx/CVE-2025-6399.json) (`2025-06-25T20:13:30.100`)
- [CVE-2025-6400](CVE-2025/CVE-2025-64xx/CVE-2025-6400.json) (`2025-06-25T20:13:52.420`)
- [CVE-2025-6401](CVE-2025/CVE-2025-64xx/CVE-2025-6401.json) (`2025-06-25T20:14:01.440`)
- [CVE-2025-6402](CVE-2025/CVE-2025-64xx/CVE-2025-6402.json) (`2025-06-25T20:14:57.620`)
- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-25T20:16:24.850`)
- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-25T20:16:33.910`)
- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-25T20:00:54.297`)
## Download and Usage

View File

@ -115378,12 +115378,12 @@ CVE-2018-14664,0,0,d39730f8033a2ee7a627fba81a3b8019307724436543d9d2cb40d88008e52
CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000
CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000
CVE-2018-14667,0,0,18c36a55cb980d64c9740e6163f509c46ab1d042f2ae71d44b133966d6b42286,2025-01-27T21:56:01.393000
CVE-2018-14668,0,1,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000
CVE-2018-14669,0,1,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000
CVE-2018-14668,0,0,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000
CVE-2018-14669,0,0,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000
CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000
CVE-2018-14670,0,1,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000
CVE-2018-14671,0,1,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000
CVE-2018-14672,0,1,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000
CVE-2018-14670,0,0,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000
CVE-2018-14671,0,0,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000
CVE-2018-14672,0,0,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000
CVE-2018-14678,0,0,f956068273933e31d6ddfcb673e2571e4ecfbd81298740cd23e82093d1433341,2024-11-21T03:49:34.110000
CVE-2018-14679,0,0,8c33f62b7ee85a5d12bb315f15fffbcae733e275d9eb70ca0ddb336efbd22595,2024-11-21T03:49:34.277000
CVE-2018-1468,0,0,a55d111a437933d52cea85e7d19b027c43602da2803d0d19de42b38b69380664,2024-11-21T03:59:53.150000
@ -133078,7 +133078,7 @@ CVE-2019-15020,0,0,630d7b4210c7c67ec4447970e2af28bbd91d420b15614b115818b213675f5
CVE-2019-15021,0,0,08f6b9f98ee1a23c24ca986e8d91253fbf3b5ae0fe4c81104b4c7fb2f3171a65,2024-11-21T04:27:53.323000
CVE-2019-15022,0,0,bfe14cca6a1454f3135ff8ba19c810f59836852e186e8d5e44b6d985ab9c1686,2024-11-21T04:27:53.433000
CVE-2019-15023,0,0,a4522a188e821023bf5a10c1405274e6c6f969416dcb0b34b4735ed714c95464,2024-11-21T04:27:53.543000
CVE-2019-15024,0,1,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000
CVE-2019-15024,0,0,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000
CVE-2019-15025,0,0,0408722231530bdeff3b26c5d9ad910ae11a2ad433f3af63fb91eef40cfe3ae0,2024-11-21T04:27:53.753000
CVE-2019-15026,0,0,1e52ede252a1d82cd4996061eb9935e914a3c75ccd024ed159b8e0001fa02395,2024-11-21T04:27:53.893000
CVE-2019-15027,0,0,50f5c82a84bdcc75e023cd8cb06c8f3d9d7ea2eeb012962db6afd56ae6c2c7da,2024-11-21T04:27:54.050000
@ -134430,7 +134430,7 @@ CVE-2019-16531,0,0,172383ab40b6099e9d1216efe38c87beb985f309229e66e7019d6a9d5664b
CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000
CVE-2019-16533,0,0,9981d589cb2c6a2333906e53b2698ea3cb77df81a99c8b000c7e4dc1e8d43edb,2024-11-21T04:30:46.747000
CVE-2019-16534,0,0,b8cd3a4caf58fff341660dc3f6ae2c9dddebda869ab485c641f77e65f337ec10,2024-11-21T04:30:46.890000
CVE-2019-16535,0,1,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000
CVE-2019-16535,0,0,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000
CVE-2019-16536,0,0,90cf5f987df5fe50a6facccc416c9bb2fcca394e6edd1a8786dcc6a41a983f6d,2025-05-21T20:24:58.133000
CVE-2019-16538,0,0,995fc2a04e0441c78315e326891241cb00233a90a3d004d795ae3c0385ba5f8d,2024-11-21T04:30:47.140000
CVE-2019-16539,0,0,cd64e42a64b00853e655eaaefef2132bb5046e4d97764aa715e2d499543453fa,2024-11-21T04:30:47.253000
@ -135958,7 +135958,7 @@ CVE-2019-18653,0,0,9ad0273a7789886345d8b3a9496c9d940270f02805e0c0b294001cba0f019
CVE-2019-18654,0,0,fe09ed716299952e52c2713d92ac50f27d174a0dfd3aae1c625c5faf64c6f2bd,2024-11-21T04:33:27.700000
CVE-2019-18655,0,0,658d25000318ccd7567aae6e466e0e954fbb9d01881bd86f814513ddf84eab5e,2024-11-21T04:33:27.837000
CVE-2019-18656,0,0,82511e7f8fdf425a3bf2d7a830982da6bc618e9b7a435f4524cb597c07a70f19,2024-11-21T04:33:27.977000
CVE-2019-18657,0,1,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000
CVE-2019-18657,0,0,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000
CVE-2019-18658,0,0,fdc46359c23f2b7c1a24938d8e51908743f10e8ceb29b22ee29606ef9816156a,2024-11-21T04:33:28.240000
CVE-2019-18659,0,0,08d331ef6e39172a98c50bea716ac87bbf267eb65904f9af3f52b782feafb419,2024-11-21T04:33:28.370000
CVE-2019-1866,0,0,111749620e55dff4176608c16008c01c0b9d27eb10f128307a00885840d54a55,2024-11-21T04:37:34.197000
@ -184179,12 +184179,12 @@ CVE-2021-42383,0,0,2ee9d2a61d9456c5eaf2fb0c557413f83e4faf955892e84a5df8156629671
CVE-2021-42384,0,0,7e8c04b966d333d62e0b017466ea1d98d54c47043868c17b44b6be05a4bebe8d,2025-04-23T20:15:35.107000
CVE-2021-42385,0,0,745f244102209a5fe227a9bac0ec2f4852a18b6c98418307869338b1720a2cff,2025-04-23T20:15:35.277000
CVE-2021-42386,0,0,591b31101e6330b5b685182d1647e7289904afba0033068ce2cdf44c4fb24450,2025-04-23T20:15:35.460000
CVE-2021-42387,0,1,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000
CVE-2021-42388,0,1,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000
CVE-2021-42389,0,1,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000
CVE-2021-42387,0,0,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000
CVE-2021-42388,0,0,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000
CVE-2021-42389,0,0,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000
CVE-2021-4239,0,0,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000
CVE-2021-42390,0,1,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000
CVE-2021-42391,0,1,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000
CVE-2021-42390,0,0,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000
CVE-2021-42391,0,0,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000
CVE-2021-42392,0,0,870225882c86a5e7bbf488d0533fd6b59fe011aabd02ab61e25a117152545425,2024-11-21T06:27:43.510000
CVE-2021-4240,0,0,4429bd83f2c215b32341b9555cc7c8670ede3133a33e9b63173833f246a37aa1,2024-11-21T06:37:12.850000
CVE-2021-4241,0,0,b5325a6a01c59d88d77a51dbc7356eda074a5a7826f1bd915437bb9d34df68d3,2024-11-21T06:37:13
@ -184777,8 +184777,8 @@ CVE-2021-43300,0,0,c275a930d347cdb6784bf4d4c290a0157a19de2da01da70d69ac53e244def
CVE-2021-43301,0,0,2bc72cab56ffab2ce6cd37e3e4d8b450597d2c665e6be25260a5cf1e724616d5,2024-11-21T06:29:02.293000
CVE-2021-43302,0,0,a8c15a55cfbf9e62cdebc9c5fd98190b531a584b3c396e13d62427f8146fc0fb,2024-11-21T06:29:02.430000
CVE-2021-43303,0,0,6041a5ec6e49c0e1266efd8afcd46c540a4f90dc2eb21675d6cc8ebcd07c647c,2024-11-21T06:29:02.567000
CVE-2021-43304,0,1,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000
CVE-2021-43305,0,1,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000
CVE-2021-43304,0,0,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000
CVE-2021-43305,0,0,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000
CVE-2021-43306,0,0,6a3fef953952a7bdb4437e1fddfbd2bd4ca78c0979c6b89226d30cbc090d29bc,2024-11-21T06:29:02.997000
CVE-2021-43307,0,0,14ebae75be29f807b3aa1779ce7f5a0b4a03ee6c26fb5b44f61f19b0a0eebecf,2024-11-21T06:29:03.153000
CVE-2021-43308,0,0,ccf51be70e831efd4c793dc723e15ed0f1b2f4a503c7df8ef2d502699146e7c2,2024-11-21T06:29:03.300000
@ -194361,7 +194361,7 @@ CVE-2022-2476,0,0,81c9fb1c14cc84d08c4f9c473c136cc8337555e7e642a27c92ff41e8f8da6f
CVE-2022-24760,0,0,d0acc93be83ffae24915367b4b6306b79610730fdb80d1da5115674ac1788ae4,2024-11-21T06:51:02.140000
CVE-2022-24761,0,0,c34ae62f344125ff4ea9aa9ba1c715bd701e6a1651586e2caf640f69cc60bd08,2024-11-21T06:51:02.277000
CVE-2022-24762,0,0,1e3f71fc8314e6dc48d8dee7014fadc06bb1d5982d4291f95134dce1d1915ab1,2024-11-21T06:51:02.423000
CVE-2022-24763,0,1,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000
CVE-2022-24763,0,0,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000
CVE-2022-24764,0,0,89dad225dc3b3fa5a60d0bc24b363069e33c3bbc9ad29d8feb19eac5f3cc57a3,2024-11-21T06:51:02.713000
CVE-2022-24765,0,0,62e773a78a94ad4e8f0d5d21771c5c069d45cca88258c77123b5f178b94d7a4e,2024-11-21T06:51:02.873000
CVE-2022-24766,0,0,c21503521909e4d5e7a1a45b1e8f6aa8f913c98fbb2249ec96e3033ab9a9f909,2024-11-21T06:51:03.097000
@ -195821,7 +195821,7 @@ CVE-2022-26485,0,0,8097b1d074d17acd7eae94a44c47c1f87ffdd03014852b38d5c09c808f594
CVE-2022-26486,0,0,7ae344cd6b3df6922aa27361efb2c59b455d55877c6f5e8892c25421efeab461,2025-03-21T21:09:05.467000
CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000
CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000
CVE-2022-26490,0,1,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000
CVE-2022-26490,0,0,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000
CVE-2022-26491,0,0,38da9ad5f8ca1df2bbd3c9b754b6557267743f8da9bf7684be3d7f5859475cdd,2024-11-21T06:54:02.903000
CVE-2022-26493,0,0,45d702f036419d269fa1be80b1c15aefad5472edd9ad6f077804415e4925546a,2024-11-21T06:54:03.060000
CVE-2022-26494,0,0,8fff31029f4f5d20b9f41b506f758ae87d7dc4b4175545dfde3497b5681f3b84,2024-11-21T06:54:03.187000
@ -197337,7 +197337,7 @@ CVE-2022-28387,0,0,eb0e279e3253748688a24cf7e2bf1beab0ac9d5f4a4ba7e1a89a1ee825658
CVE-2022-28388,0,0,cc7e52d83765ff9c3ba4b28806805b1143b9bd2fa20f4935ad8a0af9de3ecd08,2025-05-05T17:18:07.003000
CVE-2022-28389,0,0,9a742432ea1a7380486c7a56174889f0d1fcedfbfe5886bdd54c249882445b64,2024-11-21T06:57:16.910000
CVE-2022-2839,0,0,7fd69894fac20abf0ba8b7d7458b4c5a9161b8193da61a2478addeaba334edf9,2024-11-21T07:01:47.040000
CVE-2022-28390,0,1,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000
CVE-2022-28390,0,0,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000
CVE-2022-28391,0,0,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000
CVE-2022-28394,0,0,e7a9805383fd0b990b4b36a0272f702b26eeba74919c99a35076e386f087840b,2024-11-21T06:57:17.407000
CVE-2022-28396,0,0,30f27ee37312f87644c0b8c627b8a982d1b4843e6ff9c89cb97c3241ed80ec73,2023-11-07T03:45:42.307000
@ -197387,7 +197387,7 @@ CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c7656
CVE-2022-2846,0,0,09ca642261916a2545bf5d6e5f44016b0856aefd376fa0d71b5e0d073c258b42,2025-04-15T13:15:48.600000
CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000
CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000
CVE-2022-28463,0,1,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000
CVE-2022-28463,0,0,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000
CVE-2022-28464,0,0,33f750b853983c076550a70464146c516df966bc8df75ea75e320ee3805da710,2024-11-21T06:57:23.640000
CVE-2022-28467,0,0,e67776d445d5825c647ef55fac1670b0221e19dd076d0530b0628d0dcf3a3642,2024-11-21T06:57:23.780000
CVE-2022-28468,0,0,0c7ebeca30b08b36babd861cf60ac0e43258d3bb7987ebd7d656eb02fdbc8a9f,2024-11-21T06:57:23.920000
@ -198021,7 +198021,7 @@ CVE-2022-29200,0,0,54f2472dcb06d942f0eb63eef463805570b2599e2f8b21ee8fce06c3f5eda
CVE-2022-29201,0,0,578af7c064baeb58c25bdd26275c1ec2aba241e393d360d06b839c3c1e719eb3,2024-11-21T06:58:42.103000
CVE-2022-29202,0,0,4d352bb276ee429929a6572f5c446f8fa3eeb9afaadd41837e599235382291eb,2024-11-21T06:58:42.247000
CVE-2022-29203,0,0,3f7cc3b349cce75f3d4fc2f0873572d398828c5164b322a39fa4e5a94420904b,2024-11-21T06:58:42.410000
CVE-2022-29204,0,1,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000
CVE-2022-29204,0,0,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000
CVE-2022-29205,0,0,98046ee38239e28ec5f1eb7a701a7b74a933e66b98f4f06a49728d932773eae9,2024-11-21T06:58:42.727000
CVE-2022-29206,0,0,6239f02ed2583fbba040d415d9bafc3a932f0654c3c3ef185bca6ff3ec251a1d,2024-11-21T06:58:42.890000
CVE-2022-29207,0,0,fa3f7025321b52ea1036720f8d3d993da43b4c478e354c8653faa1f1bd884828,2024-11-21T06:58:43.037000
@ -203462,7 +203462,7 @@ CVE-2022-35850,0,0,16e73c68241b6f534026c6ee4057e56acef249b3c4b748cc913bf834de765
CVE-2022-35851,0,0,a2a05b0d9cdd7d7124634027cb913cec2d56c09bcd03e216524c088a8eef3623,2024-11-21T07:11:49.203000
CVE-2022-35857,0,0,bf2e8e0e7a670eb476ca39ca111c20d4f26f6b599703ae270ac0a918aa325a3e,2024-11-21T07:11:49.337000
CVE-2022-35858,0,0,e6243c00dac9c8d912d1f1b58e249007048b7f2b48a3842c468d8f283caa70dc,2024-11-21T07:11:49.500000
CVE-2022-3586,0,1,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000
CVE-2022-3586,0,0,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000
CVE-2022-35860,0,0,e502713bf298de612260da4a57f889043b4b596a2e804b5d0f6a0555a936d503,2025-05-09T15:15:53.687000
CVE-2022-35861,0,0,590658b98a2052816e5e9365cb85707c3be5829dc57a485c1bbdcf1151a94bae,2024-11-21T07:11:49.840000
CVE-2022-35864,0,0,ea1793aff89748601f3fb19ad93ac0e7e8fdc4b8711c1f4bc888a287cb47ccf4,2024-11-21T07:11:50
@ -207649,7 +207649,7 @@ CVE-2022-41264,0,0,891adf340323623f0abbe985ae9cee1af3c286a239cce6e5d6879977ecb12
CVE-2022-41266,0,0,fbb6118ac0cadec6e8cfa2bf1a753628b56d86104cf336bbb467f9b2dec1b796,2024-11-21T07:22:56.740000
CVE-2022-41267,0,0,6b0b43be4375c0101f53f6828530ea2410934145ce60641a22307de0a4e92b9f,2024-11-21T07:22:56.897000
CVE-2022-41268,0,0,2866988d39f0ed9d1413f4d9c58ef831697d081c69beeac4aa2cc289041e429c,2024-11-21T07:22:57.050000
CVE-2022-4127,0,1,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000
CVE-2022-4127,0,0,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000
CVE-2022-41271,0,0,e9c99016c2c540f31040e2265bc82b49e2ef289cdd0c0d0af05e684ecee4cb43,2024-11-21T07:22:57.213000
CVE-2022-41272,0,0,82f39d2cd93b474348b59cc15e10e0b3666cd4025d8bd134f3968d6a4abc44b3,2024-11-21T07:22:57.363000
CVE-2022-41273,0,0,71d4f43c4d8a7f57978231a59fa5adca6a6618734e60991f37cc183b265363ac,2024-11-21T07:22:57.510000
@ -207657,7 +207657,7 @@ CVE-2022-41274,0,0,af436b20fca94f8b760fa9b7eee395c98917ed93d45bef5f9ab4a31bf81d8
CVE-2022-41275,0,0,ff4fceb84e1887a91657f550077343488a1de582d9a97a8b2e12d56e6ee90375,2024-11-21T07:22:57.793000
CVE-2022-41278,0,0,2b2c19e2ff7a3ed4052e392266101c0faa6d2056411fab379b449fde67e1f631,2024-11-21T07:22:57.933000
CVE-2022-41279,0,0,9a24968e11881a2c66ce99a266d99a561d191394857f9e03fc73079c0147f49f,2024-11-21T07:22:58.073000
CVE-2022-4128,0,1,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000
CVE-2022-4128,0,0,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000
CVE-2022-41280,0,0,3a059c83c1410f9d71d0d689d86c4889ddda928445e6f38c9fae89fe86d15063,2024-11-21T07:22:58.197000
CVE-2022-41281,0,0,e84e6252a6c352d80b00ba9eefe4e798deb46ab8008003688196786dbe2ccaaf,2024-11-21T07:22:58.320000
CVE-2022-41282,0,0,c563504849e025211b68f72f3701f4be97a1e3a2b4cbbdc059bdb9a910383e60,2024-11-21T07:22:58.443000
@ -222199,7 +222199,7 @@ CVE-2023-26541,0,0,1fe90d75d3ca6bc2c5bcf121b872e8147dab21313109ae6036dcb1ca0eec8
CVE-2023-26542,0,0,d052e95deb4acf3eba2e70144cf72735d44820a992e39ca3aa1f8e74c1be1a2a,2024-11-21T07:51:42.750000
CVE-2023-26543,0,0,b8a2d3a1c4135d93e303408bf47f5d49b290ea8dcd377baad5e20bef063c755f,2024-11-21T07:51:42.870000
CVE-2023-26544,0,0,a5cc4cca93a3268fd13238f1943d936ac36c95fdb28714650626cfa9138bdf4a,2025-05-05T16:15:31.337000
CVE-2023-26545,0,1,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000
CVE-2023-26545,0,0,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000
CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000
CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000
CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000
@ -228479,7 +228479,7 @@ CVE-2023-34386,0,0,3e21beb4557c98228f588552bee4c4f19f8ee6009689f9ba7ed52ba68790c
CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000
CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000
CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000
CVE-2023-3439,0,1,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000
CVE-2023-3439,0,0,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000
CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000
CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000
CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000
@ -242445,7 +242445,7 @@ CVE-2023-52975,0,0,d618879d4658767443c6c40cc8b0f21510acd82494ef8ec138beaa1743320
CVE-2023-52976,0,0,920b841cf197f566a16762901ae16133745217324fe76b492e5135a8e694b9f2,2025-04-15T14:46:18.690000
CVE-2023-52977,0,0,83a4c467fc1ba0915b55cbeefeba187eb18f393c741548cb47f860a97809fba0,2025-04-15T14:49:08.120000
CVE-2023-52978,0,0,4f19fce5e67936ceb035c2400709644ce0d690e2038338139ebd3784810de9da,2025-04-15T14:49:22.897000
CVE-2023-52979,0,1,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000
CVE-2023-52979,0,0,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000
CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000
CVE-2023-52980,0,0,4641100b19aa28664d8b14bbb512164aafcca33a6f1cdb080c45653f95d87360,2025-03-28T18:11:49.747000
CVE-2023-52981,0,0,f164a1046931069724d8fe6fa7ada00d7f4d44532953117d1bb939b180055dbd,2025-03-28T18:11:49.747000
@ -242930,7 +242930,7 @@ CVE-2023-5627,0,0,7b0bcde2fc0123738866cf0fb88f9c984cb3778e0474460a09010dbb618fe5
CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000
CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000
CVE-2023-5631,0,0,a32d4f7d333b4d827827657c5a3712653d70de78185cf2b33e4324aacc9a9532,2025-03-19T20:57:50.170000
CVE-2023-5632,0,1,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000
CVE-2023-5632,0,0,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000
CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000
CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000
CVE-2023-5635,0,0,9130aaaf5358709df5f45a6848452e24c68955b91bbc32d8c699cf7387a1ea7d,2024-11-21T08:42:10.073000
@ -243841,7 +243841,7 @@ CVE-2023-6618,0,0,b1d954c5a68bec0b0caaa166229856ec2cf1636713231404f6e21ce6700fc7
CVE-2023-6619,0,0,180316cc6fd360c1cfe418b9baabb68fdbfe5b0679f655882ed55290e60a7e09,2024-11-21T08:44:12.967000
CVE-2023-6620,0,0,72770b1adae71390029ea1b85f70cbdb0f3e8316f7f77ed555fd07ad7e41632c,2025-06-20T17:15:39.273000
CVE-2023-6621,0,0,45d08c0617d753e5518b97154cc5c39ff4b744ffee7076e776268faef7fa9fe7,2025-06-18T16:15:24.997000
CVE-2023-6622,0,1,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000
CVE-2023-6622,0,0,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000
CVE-2023-6623,0,0,5e23d369a4a62abc3183aca77bef7c770619331921351e05c3215ceee926bb59,2025-06-11T17:15:39.603000
CVE-2023-6624,0,0,14b1d11c7c28372381d833e91bb6e8d6b5ae79a5a2308516320c5eaf260d808d,2024-11-21T08:44:13.620000
CVE-2023-6625,0,0,58e71e75bdd7fa9f584144b5454e3e903c5a320d23208fe448d38469c7d632af,2024-11-21T08:44:13.750000
@ -245174,7 +245174,7 @@ CVE-2024-0765,0,0,147924df3c2a99e28ac84acf5407b5a7987726a2c64f3e2adccb459d5985f3
CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000
CVE-2024-0767,0,0,a7ee481ab1c66b7c498da64ae1084c6748849512829a473ad9f194f786a0f5bb,2025-01-08T18:42:46.573000
CVE-2024-0768,0,0,91bcda62ea828832b073b37c60b407aec931c03659bedab78b2dbf7b33dc45cb,2025-01-08T18:42:05.587000
CVE-2024-0769,0,1,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000
CVE-2024-0769,0,0,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000
CVE-2024-0770,0,0,aa612333eb176e6028f7918ce18a4aa38bcb21688669aa13f59c2d5bff87865a,2024-11-21T08:47:20.020000
CVE-2024-0771,0,0,787c709b50080c9e3e387feda8598650487f948af1881a094925b288f94ee3c4,2024-11-21T08:47:20.167000
CVE-2024-0772,0,0,11c44bbc7d313553d3abc0d43a5d3567962f2383088d45c3a3c23d148c3e5d5b,2024-11-21T08:47:20.320000
@ -247289,7 +247289,7 @@ CVE-2024-11842,0,0,5d3f7f03aec1de59476cc9102b4d1c2e310d2486baacf5c1e41b3d22ffbb3
CVE-2024-11843,0,0,9148793901924e01d68dcf452624105ccc14c37b642b23610baa1c9335aa6147,2025-06-09T18:43:44.440000
CVE-2024-11844,0,0,5e2bd026f1a9170eb13fcfd4374039a0f011f60fa687eb9fc0c5045b4e4a3838,2025-06-05T15:47:22.637000
CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000
CVE-2024-11847,0,1,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000
CVE-2024-11847,0,0,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000
CVE-2024-11848,0,0,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07af81,2025-01-15T12:15:25.303000
CVE-2024-11849,0,0,ea4e74c39269b33a13076f5b8098ba3fb0ae69069c9d1e441cb581898733bba6,2025-05-14T14:19:59.560000
CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000
@ -254441,7 +254441,7 @@ CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fc
CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0350,2024-11-21T09:01:05.133000
CVE-2024-25615,0,0,3e410c28204b6057b2d87c48f5a6ad0622058c051d2e03679346238c8235ee4f,2025-03-27T21:15:46.667000
CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000
CVE-2024-25617,0,1,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000
CVE-2024-25617,0,0,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000
CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
CVE-2024-2562,0,0,1be18f6a55310d6d77eafd2e7fcba0630b8cfd517bd4ae4c7dcd5022f943b41d,2025-03-05T16:24:43.193000
@ -262147,7 +262147,7 @@ CVE-2024-35656,0,0,3436b0f14b2959bea8fc825a54c64a44f02137bbabc01c234a83c6647cb1e
CVE-2024-35657,0,0,52f2f8b62b52dcfed11b97eb150f334015e1cb23147b79a5bc882cf94990431f,2024-11-21T09:20:35.633000
CVE-2024-35658,0,0,6531be8a731cf210f8bd84cc9a1b5df6c2e6a798e2c62ee057a6ee39f70eade0,2024-11-21T09:20:35.813000
CVE-2024-35659,0,0,94fc8c9ecf9cbc329ec09ae9c57c34c10f05c7bc21806e9dc3f5cf5c53370c34,2024-11-26T16:33:20.087000
CVE-2024-3566,0,1,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000
CVE-2024-3566,0,0,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000
CVE-2024-35660,0,0,8111ea089a01680e2cd609f0bb4784592fc91adaac3d4d051159a4e1a7ab5320,2024-11-26T16:36:34.257000
CVE-2024-35661,0,0,95c094b7c7a943c2958c2c20974d6ff9a43fb5e9c9a77a59c5c355d443a5c848,2024-11-21T09:20:36.217000
CVE-2024-35662,0,0,c03d362a1ad5250505aa2f4d9f87b5b0e4e5024055b0ac4cd380c4aac4185ed0,2024-11-21T09:20:36.373000
@ -276341,7 +276341,7 @@ CVE-2024-5408,0,0,fa6b3cfb5fa0c30106c5ac3ea6add5195e2bf0919853555e00f52962c2a69b
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000
CVE-2024-54085,0,1,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000
CVE-2024-54085,0,0,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,e57e1ade9406d6824e9de4b5fb59a028c0cc0d3b407f2e5791339282678e1347,2025-06-05T15:31:08.950000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@ -289492,7 +289492,7 @@ CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3
CVE-2025-26906,0,0,7e0543f5675dd4fdfce78418317be0b5c7a02892675c1e6c88e224864ca19833,2025-04-16T13:25:37.340000
CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000
CVE-2025-26908,0,0,763803b7c362ec974948dac75bcd81ddbcb27c7125b98d9f0ea263864bc023bc,2025-04-16T13:25:37.340000
CVE-2025-26909,0,1,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000
CVE-2025-26909,0,0,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000
CVE-2025-2691,0,0,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000
CVE-2025-26910,0,0,b833418b0d88c01a32fb19919d336b1e87e068a486abb348014bd54f3dc7a322,2025-05-21T18:22:55.520000
CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000
@ -293913,7 +293913,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000
CVE-2025-36038,1,1,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000
CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000
CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000
CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000
CVE-2025-36048,0,0,48d28565b5a5dac8864125e4e10278da8c90f89c017b04d11826768d7560018f,2025-06-23T20:16:59.783000
@ -295758,7 +295758,7 @@ CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882
CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000
CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000
CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000
CVE-2025-45055,0,1,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000
CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000
CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000
CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000
CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000
@ -295794,7 +295794,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc
CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000
CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000
CVE-2025-45332,0,0,dad5ffe999fc406a7d4a0195ad5397b0fdf97a2b911d2dd9b5e5157c4c9992c1,2025-06-25T19:15:23.110000
CVE-2025-45333,1,1,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000
CVE-2025-45333,0,0,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
@ -298784,7 +298784,7 @@ CVE-2025-5725,0,0,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3c
CVE-2025-5726,0,0,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000
CVE-2025-5727,0,0,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000
CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000
CVE-2025-5729,0,1,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000
CVE-2025-5729,0,0,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000
CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000
CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000
CVE-2025-5734,0,0,7cdd81331c25c23698c2a802d4084a8a8caa095eaafc613e4054697ce885751f,2025-06-17T20:38:23.730000
@ -298892,7 +298892,7 @@ CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea
CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000
CVE-2025-5881,0,1,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000
CVE-2025-5881,0,0,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000
CVE-2025-5884,0,0,6f97e7d8567e734c8ac9f93916acf149d9708c4c785c1dfc432cd6c4214fc90b,2025-06-12T16:06:47.857000
CVE-2025-5885,0,0,0a40fefb7d701015d3752f28563b22a48fb9b0cd75f564d91f64de96fdf4f06d,2025-06-12T16:06:47.857000
CVE-2025-5886,0,0,3c370f407647cd8c5653d7e07db201df99ace9cd9a0764fcf19e96966f656527,2025-06-20T14:51:42.380000
@ -299185,22 +299185,22 @@ CVE-2025-6362,0,0,697d7f1867088a607b2bb6f80478a399605c6d472b8b7deef6ee5cf6255a5e
CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000
CVE-2025-6364,0,0,a772d9316a89b2b84d2d2b901de4c311092670edabd0ba75a32d20026c9cadaf,2025-06-23T20:16:21.633000
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
CVE-2025-6367,0,1,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
CVE-2025-6368,0,1,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000
CVE-2025-6369,0,1,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000
CVE-2025-6370,0,1,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000
CVE-2025-6371,0,1,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000
CVE-2025-6372,0,1,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000
CVE-2025-6373,0,1,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000
CVE-2025-6374,0,1,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000
CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000
CVE-2025-6369,0,0,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000
CVE-2025-6370,0,0,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000
CVE-2025-6371,0,0,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000
CVE-2025-6372,0,0,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000
CVE-2025-6373,0,0,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000
CVE-2025-6374,0,0,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000
CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c5103e,2025-06-23T20:16:21.633000
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
CVE-2025-6394,0,1,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
CVE-2025-6399,0,1,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
CVE-2025-6400,0,1,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000
CVE-2025-6401,0,1,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000
CVE-2025-6402,0,1,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000
CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000
CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000
CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000
CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000
CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
@ -299217,8 +299217,8 @@ CVE-2025-6415,0,0,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c3
CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000
CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000
CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000
CVE-2025-6419,0,1,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000
CVE-2025-6420,0,1,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000
CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000
CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000
CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000
CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000
CVE-2025-6424,0,0,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000
@ -299235,6 +299235,7 @@ CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
CVE-2025-6436,0,0,b655c6d628ece84d2581d41deda59948052e0591127f35cfcba6d4941af2d6a1,2025-06-25T14:15:25.260000
CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
CVE-2025-6443,1,1,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000
CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000
CVE-2025-6445,0,0,c4d022822323925bc49f742249f5576d460d2c00c9d8f44065d3325e11103521,2025-06-25T18:15:24.610000
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
@ -299248,7 +299249,7 @@ CVE-2025-6453,0,0,fd00a509fde83ffb8dc87e91d1ef6f6a42205887332904c731c5e5cfca51f7
CVE-2025-6455,0,0,265d0815d428cc0332c6f668217ec8a1936104b978c66942178c340270d7e0ee,2025-06-23T20:16:21.633000
CVE-2025-6456,0,0,f94955378138668eeddcf0643df7e80491ded0e1de5b6f79022b52b828de9738,2025-06-23T20:16:21.633000
CVE-2025-6457,0,0,ebb78003380f70547fbe74682acbe42e81ed1cd074968557a5247b806014978e,2025-06-23T20:16:21.633000
CVE-2025-6458,0,1,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000
CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000
CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000
CVE-2025-6467,0,0,7689241b9dd7345290f573e56d1ebc8c10c915268120539591432826a1af4380,2025-06-23T20:16:21.633000
CVE-2025-6468,0,0,1845b4082a91b449a76bde9baa14b86a11a77c0b10b331ab65d3e65c2e23afbb,2025-06-23T20:16:21.633000
@ -299347,6 +299348,32 @@ CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217c
CVE-2025-6620,0,0,5b784a98374fe70ec4a1b100e40e03f67c67a52b666ca8120f8159e1f3e46978,2025-06-25T18:15:25.137000
CVE-2025-6621,0,0,d3f259722de1f035956cfc786c4982bf87b78b61162bd5f14f24e3499d41dc2a,2025-06-25T18:15:25.310000
CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000
CVE-2025-6664,1,1,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000
CVE-2025-6665,1,1,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000
CVE-2025-6640,1,1,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000
CVE-2025-6641,1,1,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000
CVE-2025-6642,1,1,717a0241bf1d920f5b89a90101388b8ab2b4edf41dfb87969fcb22ba6d6b5047,2025-06-25T22:15:21.363000
CVE-2025-6643,1,1,b776494edb6c81037eeb408f4a3f277531847242367d6af89fbfc03e3d38fc01,2025-06-25T22:15:21.487000
CVE-2025-6644,1,1,4cc34224360ba8c59ae16269062b56b49a1d063afe405b111c1685a0bb65fe60,2025-06-25T22:15:21.617000
CVE-2025-6645,1,1,5006a229a973d0f34315661726fe83e23fae8d52eef70d2d0ea79c666600ed31,2025-06-25T22:15:21.743000
CVE-2025-6646,1,1,58e1d29ed6c64c33307bfb638db99fd59758e966a5160d94db366cf77018f961,2025-06-25T22:15:21.887000
CVE-2025-6647,1,1,50ae35b57509c8c3679a7e1a08ff11abdcb609114cacc39a3cc6a8592eaf9b8a,2025-06-25T22:15:22.027000
CVE-2025-6648,1,1,f5e84824e248dde3c1c93045cd6d86b9b619cc5fb945ea652093fff19f5033ca,2025-06-25T22:15:22.160000
CVE-2025-6649,1,1,8d7b735f3796ff1b247608aa43cf77ad22583ebe7f888e226cf191d92db737c1,2025-06-25T22:15:22.307000
CVE-2025-6650,1,1,898b2147475bddd80ee3c7c408b332c02522cc1702658d1e04ac21ff3bd9a2ce,2025-06-25T22:15:22.443000
CVE-2025-6651,1,1,65eb6accfde919dbafdfc048ca3b6e1e671586e583ab0702380eb6904d69639d,2025-06-25T22:15:22.580000
CVE-2025-6652,1,1,6c94832d1ce4132b985e4e3f3eb763dd1ee660cf3fc06c40b0491b6fde9ad113,2025-06-25T22:15:22.720000
CVE-2025-6653,1,1,09c0e63814f0fc8c8a66adefd65d89ae136874c0e5ac1ecf2f26cd3c0841b849,2025-06-25T22:15:22.870000
CVE-2025-6654,1,1,5a370473940d96cfaa74c91fdc8ed24c1ca647a6d97f8ba6ed2e98a68a45a243,2025-06-25T22:15:23.047000
CVE-2025-6655,1,1,af9e84d103f0b15ea567c3f8d6ed52853e353aa20e6750586c20c59aac0d431f,2025-06-25T22:15:23.187000
CVE-2025-6656,1,1,d256e001ec36e6fe1a6c03ed6fba61176852ff1064dde6308fa787f297655840,2025-06-25T22:15:23.330000
CVE-2025-6657,1,1,ae3bb21a11c0a7f776050f37d37b67f25f7d079e3c75753fd567041123b806c6,2025-06-25T22:15:23.467000
CVE-2025-6658,1,1,f05f18d2ef2f67b0419e0ceae9d7aee189ce738409755f8fb69dac19113f2143,2025-06-25T22:15:23.597000
CVE-2025-6659,1,1,e84b3aa084e1165a6508b21ce9ee4a9722ea9d66559623a4034b89322b4701be,2025-06-25T22:15:23.740000
CVE-2025-6660,1,1,34e8adfbc8a5e3750638d82f451b12baf6d9c480a876dac97e45583d3597d1ab,2025-06-25T22:15:23.863000
CVE-2025-6661,1,1,92323326ae62b092992f67dc7f8c5e245ab4cb21eeeb54ceaf45d371bcc897b6,2025-06-25T22:15:23.997000
CVE-2025-6662,1,1,649299c04ecf045716b034e15ae6b5fc5964ae6f7a610b5854e439030e714d01,2025-06-25T22:15:24.127000
CVE-2025-6664,0,0,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000
CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000
CVE-2025-6667,1,1,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000
CVE-2025-6668,1,1,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000
CVE-2025-6669,1,1,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000
CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000

Can't render this file because it is too large.