diff --git a/CVE-2025/CVE-2025-64xx/CVE-2025-6443.json b/CVE-2025/CVE-2025-64xx/CVE-2025-6443.json new file mode 100644 index 00000000000..88f7585f494 --- /dev/null +++ b/CVE-2025/CVE-2025-64xx/CVE-2025-6443.json @@ -0,0 +1,56 @@ +{ + "id": "CVE-2025-6443", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:20.960", + "lastModified": "2025-06-25T22:15:20.960", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of remote IP addresses when processing VXLAN traffic. The issue results from the lack of validation of the remote IP address against configured values prior to allowing ingress traffic into the internal network. An attacker can leverage this vulnerability to gain access to internal network resources. Was ZDI-CAN-26415." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N", + "baseScore": 7.2, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "CHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 3.9, + "impactScore": 2.7 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + } + ] + } + ], + "references": [ + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-424/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6640.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6640.json new file mode 100644 index 00000000000..126106f2c77 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6640.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6640", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.107", + "lastModified": "2025-06-25T22:15:21.107", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26527." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-425/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6641.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6641.json new file mode 100644 index 00000000000..3ea031851f7 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6641.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6641", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.237", + "lastModified": "2025-06-25T22:15:21.237", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26528." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-426/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6642.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6642.json new file mode 100644 index 00000000000..078a17d07bd --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6642.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6642", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.363", + "lastModified": "2025-06-25T22:15:21.363", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26530." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-427/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6643.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6643.json new file mode 100644 index 00000000000..8fef2f4a3ca --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6643.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6643", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.487", + "lastModified": "2025-06-25T22:15:21.487", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26532." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-428/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6644.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6644.json new file mode 100644 index 00000000000..585e21ac8d4 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6644.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6644", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.617", + "lastModified": "2025-06-25T22:15:21.617", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26536." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-429/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6645.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6645.json new file mode 100644 index 00000000000..3e2890a7ce7 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6645.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6645", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.743", + "lastModified": "2025-06-25T22:15:21.743", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26642." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-430/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6646.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6646.json new file mode 100644 index 00000000000..18726af1958 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6646.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6646", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:21.887", + "lastModified": "2025-06-25T22:15:21.887", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26643." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-431/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6647.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6647.json new file mode 100644 index 00000000000..b65ecc3f583 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6647.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6647", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.027", + "lastModified": "2025-06-25T22:15:22.027", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26644." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-432/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6648.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6648.json new file mode 100644 index 00000000000..348891e92c2 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6648.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6648", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.160", + "lastModified": "2025-06-25T22:15:22.160", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26671." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-433/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6649.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6649.json new file mode 100644 index 00000000000..2f2f8cb9150 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6649.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6649", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.307", + "lastModified": "2025-06-25T22:15:22.307", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26709." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-434/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6650.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6650.json new file mode 100644 index 00000000000..ac0f699411a --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6650.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6650", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.443", + "lastModified": "2025-06-25T22:15:22.443", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26712." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-435/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6651.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6651.json new file mode 100644 index 00000000000..f5cd2ac59a2 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6651.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6651", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.580", + "lastModified": "2025-06-25T22:15:22.580", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26713." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-436/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6652.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6652.json new file mode 100644 index 00000000000..689abe63f12 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6652.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6652", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.720", + "lastModified": "2025-06-25T22:15:22.720", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26724." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-437/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6653.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6653.json new file mode 100644 index 00000000000..bfda8cbf6a8 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6653.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6653", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:22.870", + "lastModified": "2025-06-25T22:15:22.870", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26726." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-438/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6654.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6654.json new file mode 100644 index 00000000000..2848f711cd2 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6654.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6654", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.047", + "lastModified": "2025-06-25T22:15:23.047", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26729." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-439/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6655.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6655.json new file mode 100644 index 00000000000..387e5daf484 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6655.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6655", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.187", + "lastModified": "2025-06-25T22:15:23.187", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26730." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-440/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6656.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6656.json new file mode 100644 index 00000000000..4e8c8fd568a --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6656.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6656", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.330", + "lastModified": "2025-06-25T22:15:23.330", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26731." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-441/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6657.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6657.json new file mode 100644 index 00000000000..8dd16cd0751 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6657.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6657", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.467", + "lastModified": "2025-06-25T22:15:23.467", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26732." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-442/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json new file mode 100644 index 00000000000..445c3bac7db --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6658.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6658", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.597", + "lastModified": "2025-06-25T22:15:23.597", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26733." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-444/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json new file mode 100644 index 00000000000..6ef7949f940 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6659.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6659", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.740", + "lastModified": "2025-06-25T22:15:23.740", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26734." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-787" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-445/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json new file mode 100644 index 00000000000..7e7af285855 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6660.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6660", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.863", + "lastModified": "2025-06-25T22:15:23.863", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor GIF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26763." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-122" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-443/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6661.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6661.json new file mode 100644 index 00000000000..7ebc79ffa86 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6661.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6661", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:23.997", + "lastModified": "2025-06-25T22:15:23.997", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor App Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of App objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26823." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "baseScore": 7.8, + "baseSeverity": "HIGH", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "availabilityImpact": "HIGH" + }, + "exploitabilityScore": 1.8, + "impactScore": 5.9 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-416" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-446/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6662.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6662.json new file mode 100644 index 00000000000..659713ac822 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6662.json @@ -0,0 +1,60 @@ +{ + "id": "CVE-2025-6662", + "sourceIdentifier": "zdi-disclosures@trendmicro.com", + "published": "2025-06-25T22:15:24.127", + "lastModified": "2025-06-25T22:15:24.127", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26985." + } + ], + "metrics": { + "cvssMetricV30": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Secondary", + "cvssData": { + "version": "3.0", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "baseScore": 3.3, + "baseSeverity": "LOW", + "attackVector": "LOCAL", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 1.8, + "impactScore": 1.4 + } + ] + }, + "weaknesses": [ + { + "source": "zdi-disclosures@trendmicro.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-125" + } + ] + } + ], + "references": [ + { + "url": "https://www.pdf-xchange.com/support/security-bulletins.html", + "source": "zdi-disclosures@trendmicro.com" + }, + { + "url": "https://www.zerodayinitiative.com/advisories/ZDI-25-447/", + "source": "zdi-disclosures@trendmicro.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6667.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6667.json new file mode 100644 index 00000000000..936e1070e88 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6667.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6667", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-25T22:15:24.280", + "lastModified": "2025-06-25T22:15:24.280", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Car Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add_cars.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 5.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "LOW", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 2.8, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P", + "baseScore": 6.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "SINGLE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "MEDIUM", + "exploitabilityScore": 8.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-284" + }, + { + "lang": "en", + "value": "CWE-434" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/zzb1388/cve/issues/12", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313880", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313880", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.602325", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6668.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6668.json new file mode 100644 index 00000000000..46bd4ddaf4e --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6668.json @@ -0,0 +1,145 @@ +{ + "id": "CVE-2025-6668", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-25T22:15:24.450", + "lastModified": "2025-06-25T22:15:24.450", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /php_action/fetchSelectedBrand.php. The manipulation of the argument brandId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.9, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "LOW", + "vulnAvailabilityImpact": "LOW", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L", + "baseScore": 7.3, + "baseSeverity": "HIGH", + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "LOW", + "availabilityImpact": "LOW" + }, + "exploitabilityScore": 3.9, + "impactScore": 3.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", + "baseScore": 7.5, + "accessVector": "NETWORK", + "accessComplexity": "LOW", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "PARTIAL", + "availabilityImpact": "PARTIAL" + }, + "baseSeverity": "HIGH", + "exploitabilityScore": 10.0, + "impactScore": 6.4, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-74" + }, + { + "lang": "en", + "value": "CWE-89" + } + ] + } + ], + "references": [ + { + "url": "https://code-projects.org/", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/lijingze-eng/cve/issues/1", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313881", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313881", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.602340", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/CVE-2025/CVE-2025-66xx/CVE-2025-6669.json b/CVE-2025/CVE-2025-66xx/CVE-2025-6669.json new file mode 100644 index 00000000000..6fdc6b26948 --- /dev/null +++ b/CVE-2025/CVE-2025-66xx/CVE-2025-6669.json @@ -0,0 +1,153 @@ +{ + "id": "CVE-2025-6669", + "sourceIdentifier": "cna@vuldb.com", + "published": "2025-06-25T23:15:21.310", + "lastModified": "2025-06-25T23:15:21.310", + "vulnStatus": "Received", + "cveTags": [], + "descriptions": [ + { + "lang": "en", + "value": "A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key\r . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component." + } + ], + "metrics": { + "cvssMetricV40": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "4.0", + "vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", + "baseScore": 6.3, + "baseSeverity": "MEDIUM", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "attackRequirements": "NONE", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "vulnConfidentialityImpact": "LOW", + "vulnIntegrityImpact": "NONE", + "vulnAvailabilityImpact": "NONE", + "subConfidentialityImpact": "NONE", + "subIntegrityImpact": "NONE", + "subAvailabilityImpact": "NONE", + "exploitMaturity": "PROOF_OF_CONCEPT", + "confidentialityRequirement": "NOT_DEFINED", + "integrityRequirement": "NOT_DEFINED", + "availabilityRequirement": "NOT_DEFINED", + "modifiedAttackVector": "NOT_DEFINED", + "modifiedAttackComplexity": "NOT_DEFINED", + "modifiedAttackRequirements": "NOT_DEFINED", + "modifiedPrivilegesRequired": "NOT_DEFINED", + "modifiedUserInteraction": "NOT_DEFINED", + "modifiedVulnConfidentialityImpact": "NOT_DEFINED", + "modifiedVulnIntegrityImpact": "NOT_DEFINED", + "modifiedVulnAvailabilityImpact": "NOT_DEFINED", + "modifiedSubConfidentialityImpact": "NOT_DEFINED", + "modifiedSubIntegrityImpact": "NOT_DEFINED", + "modifiedSubAvailabilityImpact": "NOT_DEFINED", + "Safety": "NOT_DEFINED", + "Automatable": "NOT_DEFINED", + "Recovery": "NOT_DEFINED", + "valueDensity": "NOT_DEFINED", + "vulnerabilityResponseEffort": "NOT_DEFINED", + "providerUrgency": "NOT_DEFINED" + } + } + ], + "cvssMetricV31": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "cvssData": { + "version": "3.1", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N", + "baseScore": 3.7, + "baseSeverity": "LOW", + "attackVector": "NETWORK", + "attackComplexity": "HIGH", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "LOW", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "exploitabilityScore": 2.2, + "impactScore": 1.4 + } + ], + "cvssMetricV2": [ + { + "source": "cna@vuldb.com", + "type": "Secondary", + "cvssData": { + "version": "2.0", + "vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N", + "baseScore": 2.6, + "accessVector": "NETWORK", + "accessComplexity": "HIGH", + "authentication": "NONE", + "confidentialityImpact": "PARTIAL", + "integrityImpact": "NONE", + "availabilityImpact": "NONE" + }, + "baseSeverity": "LOW", + "exploitabilityScore": 4.9, + "impactScore": 2.9, + "acInsufInfo": false, + "obtainAllPrivilege": false, + "obtainUserPrivilege": false, + "obtainOtherPrivilege": false, + "userInteractionRequired": false + } + ] + }, + "weaknesses": [ + { + "source": "cna@vuldb.com", + "type": "Primary", + "description": [ + { + "lang": "en", + "value": "CWE-320" + }, + { + "lang": "en", + "value": "CWE-321" + } + ] + } + ], + "references": [ + { + "url": "https://github.com/gooaclok819/sublinkX/commit/778d26aef723daa58df98c8060c43f5bf5d1b10b", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gooaclok819/sublinkX/issues/69", + "source": "cna@vuldb.com" + }, + { + "url": "https://github.com/gooaclok819/sublinkX/releases/tag/1.9", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?ctiid.313882", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?id.313882", + "source": "cna@vuldb.com" + }, + { + "url": "https://vuldb.com/?submit.602369", + "source": "cna@vuldb.com" + } + ] +} \ No newline at end of file diff --git a/README.md b/README.md index b0193276fbc..11a7f16eb8b 100644 --- a/README.md +++ b/README.md @@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours. ### Last Repository Update ```plain -2025-06-25T22:00:24.166046+00:00 +2025-06-25T23:55:26.139521+00:00 ``` ### Most recent CVE Modification Timestamp synchronized with NVD ```plain -2025-06-25T21:15:21.703000+00:00 +2025-06-25T23:15:21.310000+00:00 ``` ### Last Data Feed Release @@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/ ### Total Number of included CVEs ```plain -299351 +299378 ``` ### CVEs added in the last Commit -Recently added CVEs: `4` +Recently added CVEs: `27` -- [CVE-2025-36038](CVE-2025/CVE-2025-360xx/CVE-2025-36038.json) (`2025-06-25T21:15:20.447`) -- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-25T20:15:23.927`) -- [CVE-2025-6664](CVE-2025/CVE-2025-66xx/CVE-2025-6664.json) (`2025-06-25T21:15:21.520`) -- [CVE-2025-6665](CVE-2025/CVE-2025-66xx/CVE-2025-6665.json) (`2025-06-25T21:15:21.703`) +- [CVE-2025-6641](CVE-2025/CVE-2025-66xx/CVE-2025-6641.json) (`2025-06-25T22:15:21.237`) +- [CVE-2025-6642](CVE-2025/CVE-2025-66xx/CVE-2025-6642.json) (`2025-06-25T22:15:21.363`) +- [CVE-2025-6643](CVE-2025/CVE-2025-66xx/CVE-2025-6643.json) (`2025-06-25T22:15:21.487`) +- [CVE-2025-6644](CVE-2025/CVE-2025-66xx/CVE-2025-6644.json) (`2025-06-25T22:15:21.617`) +- [CVE-2025-6645](CVE-2025/CVE-2025-66xx/CVE-2025-6645.json) (`2025-06-25T22:15:21.743`) +- [CVE-2025-6646](CVE-2025/CVE-2025-66xx/CVE-2025-6646.json) (`2025-06-25T22:15:21.887`) +- [CVE-2025-6647](CVE-2025/CVE-2025-66xx/CVE-2025-6647.json) (`2025-06-25T22:15:22.027`) +- [CVE-2025-6648](CVE-2025/CVE-2025-66xx/CVE-2025-6648.json) (`2025-06-25T22:15:22.160`) +- [CVE-2025-6649](CVE-2025/CVE-2025-66xx/CVE-2025-6649.json) (`2025-06-25T22:15:22.307`) +- [CVE-2025-6650](CVE-2025/CVE-2025-66xx/CVE-2025-6650.json) (`2025-06-25T22:15:22.443`) +- [CVE-2025-6651](CVE-2025/CVE-2025-66xx/CVE-2025-6651.json) (`2025-06-25T22:15:22.580`) +- [CVE-2025-6652](CVE-2025/CVE-2025-66xx/CVE-2025-6652.json) (`2025-06-25T22:15:22.720`) +- [CVE-2025-6653](CVE-2025/CVE-2025-66xx/CVE-2025-6653.json) (`2025-06-25T22:15:22.870`) +- [CVE-2025-6654](CVE-2025/CVE-2025-66xx/CVE-2025-6654.json) (`2025-06-25T22:15:23.047`) +- [CVE-2025-6655](CVE-2025/CVE-2025-66xx/CVE-2025-6655.json) (`2025-06-25T22:15:23.187`) +- [CVE-2025-6656](CVE-2025/CVE-2025-66xx/CVE-2025-6656.json) (`2025-06-25T22:15:23.330`) +- [CVE-2025-6657](CVE-2025/CVE-2025-66xx/CVE-2025-6657.json) (`2025-06-25T22:15:23.467`) +- [CVE-2025-6658](CVE-2025/CVE-2025-66xx/CVE-2025-6658.json) (`2025-06-25T22:15:23.597`) +- [CVE-2025-6659](CVE-2025/CVE-2025-66xx/CVE-2025-6659.json) (`2025-06-25T22:15:23.740`) +- [CVE-2025-6660](CVE-2025/CVE-2025-66xx/CVE-2025-6660.json) (`2025-06-25T22:15:23.863`) +- [CVE-2025-6661](CVE-2025/CVE-2025-66xx/CVE-2025-6661.json) (`2025-06-25T22:15:23.997`) +- [CVE-2025-6662](CVE-2025/CVE-2025-66xx/CVE-2025-6662.json) (`2025-06-25T22:15:24.127`) +- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-25T22:15:24.280`) +- [CVE-2025-6668](CVE-2025/CVE-2025-66xx/CVE-2025-6668.json) (`2025-06-25T22:15:24.450`) +- [CVE-2025-6669](CVE-2025/CVE-2025-66xx/CVE-2025-6669.json) (`2025-06-25T23:15:21.310`) ### CVEs modified in the last Commit -Recently modified CVEs: `53` +Recently modified CVEs: `0` -- [CVE-2024-0769](CVE-2024/CVE-2024-07xx/CVE-2024-0769.json) (`2025-06-25T20:15:22.693`) -- [CVE-2024-11847](CVE-2024/CVE-2024-118xx/CVE-2024-11847.json) (`2025-06-25T20:43:39.567`) -- [CVE-2024-25617](CVE-2024/CVE-2024-256xx/CVE-2024-25617.json) (`2025-06-25T20:51:35.437`) -- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2025-06-25T20:24:12.743`) -- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-06-25T20:15:23.737`) -- [CVE-2025-26909](CVE-2025/CVE-2025-269xx/CVE-2025-26909.json) (`2025-06-25T20:47:07.753`) -- [CVE-2025-45055](CVE-2025/CVE-2025-450xx/CVE-2025-45055.json) (`2025-06-25T20:24:56.750`) -- [CVE-2025-5729](CVE-2025/CVE-2025-57xx/CVE-2025-5729.json) (`2025-06-25T20:41:36.720`) -- [CVE-2025-5881](CVE-2025/CVE-2025-58xx/CVE-2025-5881.json) (`2025-06-25T20:26:45.010`) -- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-25T20:07:04.093`) -- [CVE-2025-6368](CVE-2025/CVE-2025-63xx/CVE-2025-6368.json) (`2025-06-25T20:09:17.983`) -- [CVE-2025-6369](CVE-2025/CVE-2025-63xx/CVE-2025-6369.json) (`2025-06-25T20:09:28.010`) -- [CVE-2025-6370](CVE-2025/CVE-2025-63xx/CVE-2025-6370.json) (`2025-06-25T20:09:39.790`) -- [CVE-2025-6371](CVE-2025/CVE-2025-63xx/CVE-2025-6371.json) (`2025-06-25T20:09:48.163`) -- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-25T20:09:56.243`) -- [CVE-2025-6373](CVE-2025/CVE-2025-63xx/CVE-2025-6373.json) (`2025-06-25T20:10:16.027`) -- [CVE-2025-6374](CVE-2025/CVE-2025-63xx/CVE-2025-6374.json) (`2025-06-25T20:10:23.920`) -- [CVE-2025-6394](CVE-2025/CVE-2025-63xx/CVE-2025-6394.json) (`2025-06-25T20:12:10.560`) -- [CVE-2025-6399](CVE-2025/CVE-2025-63xx/CVE-2025-6399.json) (`2025-06-25T20:13:30.100`) -- [CVE-2025-6400](CVE-2025/CVE-2025-64xx/CVE-2025-6400.json) (`2025-06-25T20:13:52.420`) -- [CVE-2025-6401](CVE-2025/CVE-2025-64xx/CVE-2025-6401.json) (`2025-06-25T20:14:01.440`) -- [CVE-2025-6402](CVE-2025/CVE-2025-64xx/CVE-2025-6402.json) (`2025-06-25T20:14:57.620`) -- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-25T20:16:24.850`) -- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-25T20:16:33.910`) -- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-25T20:00:54.297`) ## Download and Usage diff --git a/_state.csv b/_state.csv index 87a3ccba981..7f748d9a554 100644 --- a/_state.csv +++ b/_state.csv @@ -115378,12 +115378,12 @@ CVE-2018-14664,0,0,d39730f8033a2ee7a627fba81a3b8019307724436543d9d2cb40d88008e52 CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000 CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000 CVE-2018-14667,0,0,18c36a55cb980d64c9740e6163f509c46ab1d042f2ae71d44b133966d6b42286,2025-01-27T21:56:01.393000 -CVE-2018-14668,0,1,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000 -CVE-2018-14669,0,1,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000 +CVE-2018-14668,0,0,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000 +CVE-2018-14669,0,0,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000 CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000 -CVE-2018-14670,0,1,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000 -CVE-2018-14671,0,1,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000 -CVE-2018-14672,0,1,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000 +CVE-2018-14670,0,0,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000 +CVE-2018-14671,0,0,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000 +CVE-2018-14672,0,0,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000 CVE-2018-14678,0,0,f956068273933e31d6ddfcb673e2571e4ecfbd81298740cd23e82093d1433341,2024-11-21T03:49:34.110000 CVE-2018-14679,0,0,8c33f62b7ee85a5d12bb315f15fffbcae733e275d9eb70ca0ddb336efbd22595,2024-11-21T03:49:34.277000 CVE-2018-1468,0,0,a55d111a437933d52cea85e7d19b027c43602da2803d0d19de42b38b69380664,2024-11-21T03:59:53.150000 @@ -133078,7 +133078,7 @@ CVE-2019-15020,0,0,630d7b4210c7c67ec4447970e2af28bbd91d420b15614b115818b213675f5 CVE-2019-15021,0,0,08f6b9f98ee1a23c24ca986e8d91253fbf3b5ae0fe4c81104b4c7fb2f3171a65,2024-11-21T04:27:53.323000 CVE-2019-15022,0,0,bfe14cca6a1454f3135ff8ba19c810f59836852e186e8d5e44b6d985ab9c1686,2024-11-21T04:27:53.433000 CVE-2019-15023,0,0,a4522a188e821023bf5a10c1405274e6c6f969416dcb0b34b4735ed714c95464,2024-11-21T04:27:53.543000 -CVE-2019-15024,0,1,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000 +CVE-2019-15024,0,0,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000 CVE-2019-15025,0,0,0408722231530bdeff3b26c5d9ad910ae11a2ad433f3af63fb91eef40cfe3ae0,2024-11-21T04:27:53.753000 CVE-2019-15026,0,0,1e52ede252a1d82cd4996061eb9935e914a3c75ccd024ed159b8e0001fa02395,2024-11-21T04:27:53.893000 CVE-2019-15027,0,0,50f5c82a84bdcc75e023cd8cb06c8f3d9d7ea2eeb012962db6afd56ae6c2c7da,2024-11-21T04:27:54.050000 @@ -134430,7 +134430,7 @@ CVE-2019-16531,0,0,172383ab40b6099e9d1216efe38c87beb985f309229e66e7019d6a9d5664b CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000 CVE-2019-16533,0,0,9981d589cb2c6a2333906e53b2698ea3cb77df81a99c8b000c7e4dc1e8d43edb,2024-11-21T04:30:46.747000 CVE-2019-16534,0,0,b8cd3a4caf58fff341660dc3f6ae2c9dddebda869ab485c641f77e65f337ec10,2024-11-21T04:30:46.890000 -CVE-2019-16535,0,1,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000 +CVE-2019-16535,0,0,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000 CVE-2019-16536,0,0,90cf5f987df5fe50a6facccc416c9bb2fcca394e6edd1a8786dcc6a41a983f6d,2025-05-21T20:24:58.133000 CVE-2019-16538,0,0,995fc2a04e0441c78315e326891241cb00233a90a3d004d795ae3c0385ba5f8d,2024-11-21T04:30:47.140000 CVE-2019-16539,0,0,cd64e42a64b00853e655eaaefef2132bb5046e4d97764aa715e2d499543453fa,2024-11-21T04:30:47.253000 @@ -135958,7 +135958,7 @@ CVE-2019-18653,0,0,9ad0273a7789886345d8b3a9496c9d940270f02805e0c0b294001cba0f019 CVE-2019-18654,0,0,fe09ed716299952e52c2713d92ac50f27d174a0dfd3aae1c625c5faf64c6f2bd,2024-11-21T04:33:27.700000 CVE-2019-18655,0,0,658d25000318ccd7567aae6e466e0e954fbb9d01881bd86f814513ddf84eab5e,2024-11-21T04:33:27.837000 CVE-2019-18656,0,0,82511e7f8fdf425a3bf2d7a830982da6bc618e9b7a435f4524cb597c07a70f19,2024-11-21T04:33:27.977000 -CVE-2019-18657,0,1,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000 +CVE-2019-18657,0,0,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000 CVE-2019-18658,0,0,fdc46359c23f2b7c1a24938d8e51908743f10e8ceb29b22ee29606ef9816156a,2024-11-21T04:33:28.240000 CVE-2019-18659,0,0,08d331ef6e39172a98c50bea716ac87bbf267eb65904f9af3f52b782feafb419,2024-11-21T04:33:28.370000 CVE-2019-1866,0,0,111749620e55dff4176608c16008c01c0b9d27eb10f128307a00885840d54a55,2024-11-21T04:37:34.197000 @@ -184179,12 +184179,12 @@ CVE-2021-42383,0,0,2ee9d2a61d9456c5eaf2fb0c557413f83e4faf955892e84a5df8156629671 CVE-2021-42384,0,0,7e8c04b966d333d62e0b017466ea1d98d54c47043868c17b44b6be05a4bebe8d,2025-04-23T20:15:35.107000 CVE-2021-42385,0,0,745f244102209a5fe227a9bac0ec2f4852a18b6c98418307869338b1720a2cff,2025-04-23T20:15:35.277000 CVE-2021-42386,0,0,591b31101e6330b5b685182d1647e7289904afba0033068ce2cdf44c4fb24450,2025-04-23T20:15:35.460000 -CVE-2021-42387,0,1,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000 -CVE-2021-42388,0,1,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000 -CVE-2021-42389,0,1,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000 +CVE-2021-42387,0,0,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000 +CVE-2021-42388,0,0,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000 +CVE-2021-42389,0,0,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000 CVE-2021-4239,0,0,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000 -CVE-2021-42390,0,1,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000 -CVE-2021-42391,0,1,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000 +CVE-2021-42390,0,0,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000 +CVE-2021-42391,0,0,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000 CVE-2021-42392,0,0,870225882c86a5e7bbf488d0533fd6b59fe011aabd02ab61e25a117152545425,2024-11-21T06:27:43.510000 CVE-2021-4240,0,0,4429bd83f2c215b32341b9555cc7c8670ede3133a33e9b63173833f246a37aa1,2024-11-21T06:37:12.850000 CVE-2021-4241,0,0,b5325a6a01c59d88d77a51dbc7356eda074a5a7826f1bd915437bb9d34df68d3,2024-11-21T06:37:13 @@ -184777,8 +184777,8 @@ CVE-2021-43300,0,0,c275a930d347cdb6784bf4d4c290a0157a19de2da01da70d69ac53e244def CVE-2021-43301,0,0,2bc72cab56ffab2ce6cd37e3e4d8b450597d2c665e6be25260a5cf1e724616d5,2024-11-21T06:29:02.293000 CVE-2021-43302,0,0,a8c15a55cfbf9e62cdebc9c5fd98190b531a584b3c396e13d62427f8146fc0fb,2024-11-21T06:29:02.430000 CVE-2021-43303,0,0,6041a5ec6e49c0e1266efd8afcd46c540a4f90dc2eb21675d6cc8ebcd07c647c,2024-11-21T06:29:02.567000 -CVE-2021-43304,0,1,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000 -CVE-2021-43305,0,1,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000 +CVE-2021-43304,0,0,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000 +CVE-2021-43305,0,0,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000 CVE-2021-43306,0,0,6a3fef953952a7bdb4437e1fddfbd2bd4ca78c0979c6b89226d30cbc090d29bc,2024-11-21T06:29:02.997000 CVE-2021-43307,0,0,14ebae75be29f807b3aa1779ce7f5a0b4a03ee6c26fb5b44f61f19b0a0eebecf,2024-11-21T06:29:03.153000 CVE-2021-43308,0,0,ccf51be70e831efd4c793dc723e15ed0f1b2f4a503c7df8ef2d502699146e7c2,2024-11-21T06:29:03.300000 @@ -194361,7 +194361,7 @@ CVE-2022-2476,0,0,81c9fb1c14cc84d08c4f9c473c136cc8337555e7e642a27c92ff41e8f8da6f CVE-2022-24760,0,0,d0acc93be83ffae24915367b4b6306b79610730fdb80d1da5115674ac1788ae4,2024-11-21T06:51:02.140000 CVE-2022-24761,0,0,c34ae62f344125ff4ea9aa9ba1c715bd701e6a1651586e2caf640f69cc60bd08,2024-11-21T06:51:02.277000 CVE-2022-24762,0,0,1e3f71fc8314e6dc48d8dee7014fadc06bb1d5982d4291f95134dce1d1915ab1,2024-11-21T06:51:02.423000 -CVE-2022-24763,0,1,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000 +CVE-2022-24763,0,0,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000 CVE-2022-24764,0,0,89dad225dc3b3fa5a60d0bc24b363069e33c3bbc9ad29d8feb19eac5f3cc57a3,2024-11-21T06:51:02.713000 CVE-2022-24765,0,0,62e773a78a94ad4e8f0d5d21771c5c069d45cca88258c77123b5f178b94d7a4e,2024-11-21T06:51:02.873000 CVE-2022-24766,0,0,c21503521909e4d5e7a1a45b1e8f6aa8f913c98fbb2249ec96e3033ab9a9f909,2024-11-21T06:51:03.097000 @@ -195821,7 +195821,7 @@ CVE-2022-26485,0,0,8097b1d074d17acd7eae94a44c47c1f87ffdd03014852b38d5c09c808f594 CVE-2022-26486,0,0,7ae344cd6b3df6922aa27361efb2c59b455d55877c6f5e8892c25421efeab461,2025-03-21T21:09:05.467000 CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000 CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000 -CVE-2022-26490,0,1,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000 +CVE-2022-26490,0,0,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000 CVE-2022-26491,0,0,38da9ad5f8ca1df2bbd3c9b754b6557267743f8da9bf7684be3d7f5859475cdd,2024-11-21T06:54:02.903000 CVE-2022-26493,0,0,45d702f036419d269fa1be80b1c15aefad5472edd9ad6f077804415e4925546a,2024-11-21T06:54:03.060000 CVE-2022-26494,0,0,8fff31029f4f5d20b9f41b506f758ae87d7dc4b4175545dfde3497b5681f3b84,2024-11-21T06:54:03.187000 @@ -197337,7 +197337,7 @@ CVE-2022-28387,0,0,eb0e279e3253748688a24cf7e2bf1beab0ac9d5f4a4ba7e1a89a1ee825658 CVE-2022-28388,0,0,cc7e52d83765ff9c3ba4b28806805b1143b9bd2fa20f4935ad8a0af9de3ecd08,2025-05-05T17:18:07.003000 CVE-2022-28389,0,0,9a742432ea1a7380486c7a56174889f0d1fcedfbfe5886bdd54c249882445b64,2024-11-21T06:57:16.910000 CVE-2022-2839,0,0,7fd69894fac20abf0ba8b7d7458b4c5a9161b8193da61a2478addeaba334edf9,2024-11-21T07:01:47.040000 -CVE-2022-28390,0,1,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000 +CVE-2022-28390,0,0,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000 CVE-2022-28391,0,0,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000 CVE-2022-28394,0,0,e7a9805383fd0b990b4b36a0272f702b26eeba74919c99a35076e386f087840b,2024-11-21T06:57:17.407000 CVE-2022-28396,0,0,30f27ee37312f87644c0b8c627b8a982d1b4843e6ff9c89cb97c3241ed80ec73,2023-11-07T03:45:42.307000 @@ -197387,7 +197387,7 @@ CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c7656 CVE-2022-2846,0,0,09ca642261916a2545bf5d6e5f44016b0856aefd376fa0d71b5e0d073c258b42,2025-04-15T13:15:48.600000 CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000 CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000 -CVE-2022-28463,0,1,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000 +CVE-2022-28463,0,0,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000 CVE-2022-28464,0,0,33f750b853983c076550a70464146c516df966bc8df75ea75e320ee3805da710,2024-11-21T06:57:23.640000 CVE-2022-28467,0,0,e67776d445d5825c647ef55fac1670b0221e19dd076d0530b0628d0dcf3a3642,2024-11-21T06:57:23.780000 CVE-2022-28468,0,0,0c7ebeca30b08b36babd861cf60ac0e43258d3bb7987ebd7d656eb02fdbc8a9f,2024-11-21T06:57:23.920000 @@ -198021,7 +198021,7 @@ CVE-2022-29200,0,0,54f2472dcb06d942f0eb63eef463805570b2599e2f8b21ee8fce06c3f5eda CVE-2022-29201,0,0,578af7c064baeb58c25bdd26275c1ec2aba241e393d360d06b839c3c1e719eb3,2024-11-21T06:58:42.103000 CVE-2022-29202,0,0,4d352bb276ee429929a6572f5c446f8fa3eeb9afaadd41837e599235382291eb,2024-11-21T06:58:42.247000 CVE-2022-29203,0,0,3f7cc3b349cce75f3d4fc2f0873572d398828c5164b322a39fa4e5a94420904b,2024-11-21T06:58:42.410000 -CVE-2022-29204,0,1,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000 +CVE-2022-29204,0,0,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000 CVE-2022-29205,0,0,98046ee38239e28ec5f1eb7a701a7b74a933e66b98f4f06a49728d932773eae9,2024-11-21T06:58:42.727000 CVE-2022-29206,0,0,6239f02ed2583fbba040d415d9bafc3a932f0654c3c3ef185bca6ff3ec251a1d,2024-11-21T06:58:42.890000 CVE-2022-29207,0,0,fa3f7025321b52ea1036720f8d3d993da43b4c478e354c8653faa1f1bd884828,2024-11-21T06:58:43.037000 @@ -203462,7 +203462,7 @@ CVE-2022-35850,0,0,16e73c68241b6f534026c6ee4057e56acef249b3c4b748cc913bf834de765 CVE-2022-35851,0,0,a2a05b0d9cdd7d7124634027cb913cec2d56c09bcd03e216524c088a8eef3623,2024-11-21T07:11:49.203000 CVE-2022-35857,0,0,bf2e8e0e7a670eb476ca39ca111c20d4f26f6b599703ae270ac0a918aa325a3e,2024-11-21T07:11:49.337000 CVE-2022-35858,0,0,e6243c00dac9c8d912d1f1b58e249007048b7f2b48a3842c468d8f283caa70dc,2024-11-21T07:11:49.500000 -CVE-2022-3586,0,1,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000 +CVE-2022-3586,0,0,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000 CVE-2022-35860,0,0,e502713bf298de612260da4a57f889043b4b596a2e804b5d0f6a0555a936d503,2025-05-09T15:15:53.687000 CVE-2022-35861,0,0,590658b98a2052816e5e9365cb85707c3be5829dc57a485c1bbdcf1151a94bae,2024-11-21T07:11:49.840000 CVE-2022-35864,0,0,ea1793aff89748601f3fb19ad93ac0e7e8fdc4b8711c1f4bc888a287cb47ccf4,2024-11-21T07:11:50 @@ -207649,7 +207649,7 @@ CVE-2022-41264,0,0,891adf340323623f0abbe985ae9cee1af3c286a239cce6e5d6879977ecb12 CVE-2022-41266,0,0,fbb6118ac0cadec6e8cfa2bf1a753628b56d86104cf336bbb467f9b2dec1b796,2024-11-21T07:22:56.740000 CVE-2022-41267,0,0,6b0b43be4375c0101f53f6828530ea2410934145ce60641a22307de0a4e92b9f,2024-11-21T07:22:56.897000 CVE-2022-41268,0,0,2866988d39f0ed9d1413f4d9c58ef831697d081c69beeac4aa2cc289041e429c,2024-11-21T07:22:57.050000 -CVE-2022-4127,0,1,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000 +CVE-2022-4127,0,0,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000 CVE-2022-41271,0,0,e9c99016c2c540f31040e2265bc82b49e2ef289cdd0c0d0af05e684ecee4cb43,2024-11-21T07:22:57.213000 CVE-2022-41272,0,0,82f39d2cd93b474348b59cc15e10e0b3666cd4025d8bd134f3968d6a4abc44b3,2024-11-21T07:22:57.363000 CVE-2022-41273,0,0,71d4f43c4d8a7f57978231a59fa5adca6a6618734e60991f37cc183b265363ac,2024-11-21T07:22:57.510000 @@ -207657,7 +207657,7 @@ CVE-2022-41274,0,0,af436b20fca94f8b760fa9b7eee395c98917ed93d45bef5f9ab4a31bf81d8 CVE-2022-41275,0,0,ff4fceb84e1887a91657f550077343488a1de582d9a97a8b2e12d56e6ee90375,2024-11-21T07:22:57.793000 CVE-2022-41278,0,0,2b2c19e2ff7a3ed4052e392266101c0faa6d2056411fab379b449fde67e1f631,2024-11-21T07:22:57.933000 CVE-2022-41279,0,0,9a24968e11881a2c66ce99a266d99a561d191394857f9e03fc73079c0147f49f,2024-11-21T07:22:58.073000 -CVE-2022-4128,0,1,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000 +CVE-2022-4128,0,0,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000 CVE-2022-41280,0,0,3a059c83c1410f9d71d0d689d86c4889ddda928445e6f38c9fae89fe86d15063,2024-11-21T07:22:58.197000 CVE-2022-41281,0,0,e84e6252a6c352d80b00ba9eefe4e798deb46ab8008003688196786dbe2ccaaf,2024-11-21T07:22:58.320000 CVE-2022-41282,0,0,c563504849e025211b68f72f3701f4be97a1e3a2b4cbbdc059bdb9a910383e60,2024-11-21T07:22:58.443000 @@ -222199,7 +222199,7 @@ CVE-2023-26541,0,0,1fe90d75d3ca6bc2c5bcf121b872e8147dab21313109ae6036dcb1ca0eec8 CVE-2023-26542,0,0,d052e95deb4acf3eba2e70144cf72735d44820a992e39ca3aa1f8e74c1be1a2a,2024-11-21T07:51:42.750000 CVE-2023-26543,0,0,b8a2d3a1c4135d93e303408bf47f5d49b290ea8dcd377baad5e20bef063c755f,2024-11-21T07:51:42.870000 CVE-2023-26544,0,0,a5cc4cca93a3268fd13238f1943d936ac36c95fdb28714650626cfa9138bdf4a,2025-05-05T16:15:31.337000 -CVE-2023-26545,0,1,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000 +CVE-2023-26545,0,0,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000 CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000 CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000 CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000 @@ -228479,7 +228479,7 @@ CVE-2023-34386,0,0,3e21beb4557c98228f588552bee4c4f19f8ee6009689f9ba7ed52ba68790c CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000 CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000 CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000 -CVE-2023-3439,0,1,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000 +CVE-2023-3439,0,0,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000 CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000 CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000 CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000 @@ -242445,7 +242445,7 @@ CVE-2023-52975,0,0,d618879d4658767443c6c40cc8b0f21510acd82494ef8ec138beaa1743320 CVE-2023-52976,0,0,920b841cf197f566a16762901ae16133745217324fe76b492e5135a8e694b9f2,2025-04-15T14:46:18.690000 CVE-2023-52977,0,0,83a4c467fc1ba0915b55cbeefeba187eb18f393c741548cb47f860a97809fba0,2025-04-15T14:49:08.120000 CVE-2023-52978,0,0,4f19fce5e67936ceb035c2400709644ce0d690e2038338139ebd3784810de9da,2025-04-15T14:49:22.897000 -CVE-2023-52979,0,1,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000 +CVE-2023-52979,0,0,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 CVE-2023-52980,0,0,4641100b19aa28664d8b14bbb512164aafcca33a6f1cdb080c45653f95d87360,2025-03-28T18:11:49.747000 CVE-2023-52981,0,0,f164a1046931069724d8fe6fa7ada00d7f4d44532953117d1bb939b180055dbd,2025-03-28T18:11:49.747000 @@ -242930,7 +242930,7 @@ CVE-2023-5627,0,0,7b0bcde2fc0123738866cf0fb88f9c984cb3778e0474460a09010dbb618fe5 CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000 CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000 CVE-2023-5631,0,0,a32d4f7d333b4d827827657c5a3712653d70de78185cf2b33e4324aacc9a9532,2025-03-19T20:57:50.170000 -CVE-2023-5632,0,1,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000 +CVE-2023-5632,0,0,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000 CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000 CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000 CVE-2023-5635,0,0,9130aaaf5358709df5f45a6848452e24c68955b91bbc32d8c699cf7387a1ea7d,2024-11-21T08:42:10.073000 @@ -243841,7 +243841,7 @@ CVE-2023-6618,0,0,b1d954c5a68bec0b0caaa166229856ec2cf1636713231404f6e21ce6700fc7 CVE-2023-6619,0,0,180316cc6fd360c1cfe418b9baabb68fdbfe5b0679f655882ed55290e60a7e09,2024-11-21T08:44:12.967000 CVE-2023-6620,0,0,72770b1adae71390029ea1b85f70cbdb0f3e8316f7f77ed555fd07ad7e41632c,2025-06-20T17:15:39.273000 CVE-2023-6621,0,0,45d08c0617d753e5518b97154cc5c39ff4b744ffee7076e776268faef7fa9fe7,2025-06-18T16:15:24.997000 -CVE-2023-6622,0,1,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000 +CVE-2023-6622,0,0,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000 CVE-2023-6623,0,0,5e23d369a4a62abc3183aca77bef7c770619331921351e05c3215ceee926bb59,2025-06-11T17:15:39.603000 CVE-2023-6624,0,0,14b1d11c7c28372381d833e91bb6e8d6b5ae79a5a2308516320c5eaf260d808d,2024-11-21T08:44:13.620000 CVE-2023-6625,0,0,58e71e75bdd7fa9f584144b5454e3e903c5a320d23208fe448d38469c7d632af,2024-11-21T08:44:13.750000 @@ -245174,7 +245174,7 @@ CVE-2024-0765,0,0,147924df3c2a99e28ac84acf5407b5a7987726a2c64f3e2adccb459d5985f3 CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000 CVE-2024-0767,0,0,a7ee481ab1c66b7c498da64ae1084c6748849512829a473ad9f194f786a0f5bb,2025-01-08T18:42:46.573000 CVE-2024-0768,0,0,91bcda62ea828832b073b37c60b407aec931c03659bedab78b2dbf7b33dc45cb,2025-01-08T18:42:05.587000 -CVE-2024-0769,0,1,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000 +CVE-2024-0769,0,0,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000 CVE-2024-0770,0,0,aa612333eb176e6028f7918ce18a4aa38bcb21688669aa13f59c2d5bff87865a,2024-11-21T08:47:20.020000 CVE-2024-0771,0,0,787c709b50080c9e3e387feda8598650487f948af1881a094925b288f94ee3c4,2024-11-21T08:47:20.167000 CVE-2024-0772,0,0,11c44bbc7d313553d3abc0d43a5d3567962f2383088d45c3a3c23d148c3e5d5b,2024-11-21T08:47:20.320000 @@ -247289,7 +247289,7 @@ CVE-2024-11842,0,0,5d3f7f03aec1de59476cc9102b4d1c2e310d2486baacf5c1e41b3d22ffbb3 CVE-2024-11843,0,0,9148793901924e01d68dcf452624105ccc14c37b642b23610baa1c9335aa6147,2025-06-09T18:43:44.440000 CVE-2024-11844,0,0,5e2bd026f1a9170eb13fcfd4374039a0f011f60fa687eb9fc0c5045b4e4a3838,2025-06-05T15:47:22.637000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 -CVE-2024-11847,0,1,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000 +CVE-2024-11847,0,0,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000 CVE-2024-11848,0,0,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07af81,2025-01-15T12:15:25.303000 CVE-2024-11849,0,0,ea4e74c39269b33a13076f5b8098ba3fb0ae69069c9d1e441cb581898733bba6,2025-05-14T14:19:59.560000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 @@ -254441,7 +254441,7 @@ CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fc CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0350,2024-11-21T09:01:05.133000 CVE-2024-25615,0,0,3e410c28204b6057b2d87c48f5a6ad0622058c051d2e03679346238c8235ee4f,2025-03-27T21:15:46.667000 CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000 -CVE-2024-25617,0,1,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000 +CVE-2024-25617,0,0,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000 CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000 CVE-2024-2562,0,0,1be18f6a55310d6d77eafd2e7fcba0630b8cfd517bd4ae4c7dcd5022f943b41d,2025-03-05T16:24:43.193000 @@ -262147,7 +262147,7 @@ CVE-2024-35656,0,0,3436b0f14b2959bea8fc825a54c64a44f02137bbabc01c234a83c6647cb1e CVE-2024-35657,0,0,52f2f8b62b52dcfed11b97eb150f334015e1cb23147b79a5bc882cf94990431f,2024-11-21T09:20:35.633000 CVE-2024-35658,0,0,6531be8a731cf210f8bd84cc9a1b5df6c2e6a798e2c62ee057a6ee39f70eade0,2024-11-21T09:20:35.813000 CVE-2024-35659,0,0,94fc8c9ecf9cbc329ec09ae9c57c34c10f05c7bc21806e9dc3f5cf5c53370c34,2024-11-26T16:33:20.087000 -CVE-2024-3566,0,1,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000 +CVE-2024-3566,0,0,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000 CVE-2024-35660,0,0,8111ea089a01680e2cd609f0bb4784592fc91adaac3d4d051159a4e1a7ab5320,2024-11-26T16:36:34.257000 CVE-2024-35661,0,0,95c094b7c7a943c2958c2c20974d6ff9a43fb5e9c9a77a59c5c355d443a5c848,2024-11-21T09:20:36.217000 CVE-2024-35662,0,0,c03d362a1ad5250505aa2f4d9f87b5b0e4e5024055b0ac4cd380c4aac4185ed0,2024-11-21T09:20:36.373000 @@ -276341,7 +276341,7 @@ CVE-2024-5408,0,0,fa6b3cfb5fa0c30106c5ac3ea6add5195e2bf0919853555e00f52962c2a69b CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000 -CVE-2024-54085,0,1,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000 +CVE-2024-54085,0,0,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000 CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-5409,0,0,e57e1ade9406d6824e9de4b5fb59a028c0cc0d3b407f2e5791339282678e1347,2025-06-05T15:31:08.950000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 @@ -289492,7 +289492,7 @@ CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3 CVE-2025-26906,0,0,7e0543f5675dd4fdfce78418317be0b5c7a02892675c1e6c88e224864ca19833,2025-04-16T13:25:37.340000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 CVE-2025-26908,0,0,763803b7c362ec974948dac75bcd81ddbcb27c7125b98d9f0ea263864bc023bc,2025-04-16T13:25:37.340000 -CVE-2025-26909,0,1,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000 +CVE-2025-26909,0,0,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000 CVE-2025-2691,0,0,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000 CVE-2025-26910,0,0,b833418b0d88c01a32fb19919d336b1e87e068a486abb348014bd54f3dc7a322,2025-05-21T18:22:55.520000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 @@ -293913,7 +293913,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 -CVE-2025-36038,1,1,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000 +CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000 CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000 CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000 CVE-2025-36048,0,0,48d28565b5a5dac8864125e4e10278da8c90f89c017b04d11826768d7560018f,2025-06-23T20:16:59.783000 @@ -295758,7 +295758,7 @@ CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882 CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000 CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000 CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000 -CVE-2025-45055,0,1,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000 +CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000 CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000 CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000 CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000 @@ -295794,7 +295794,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000 CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000 CVE-2025-45332,0,0,dad5ffe999fc406a7d4a0195ad5397b0fdf97a2b911d2dd9b5e5157c4c9992c1,2025-06-25T19:15:23.110000 -CVE-2025-45333,1,1,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000 +CVE-2025-45333,0,0,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000 CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000 CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000 CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000 @@ -298784,7 +298784,7 @@ CVE-2025-5725,0,0,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3c CVE-2025-5726,0,0,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000 CVE-2025-5727,0,0,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000 CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000 -CVE-2025-5729,0,1,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000 +CVE-2025-5729,0,0,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000 CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000 CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000 CVE-2025-5734,0,0,7cdd81331c25c23698c2a802d4084a8a8caa095eaafc613e4054697ce885751f,2025-06-17T20:38:23.730000 @@ -298892,7 +298892,7 @@ CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000 CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000 CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000 -CVE-2025-5881,0,1,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000 +CVE-2025-5881,0,0,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000 CVE-2025-5884,0,0,6f97e7d8567e734c8ac9f93916acf149d9708c4c785c1dfc432cd6c4214fc90b,2025-06-12T16:06:47.857000 CVE-2025-5885,0,0,0a40fefb7d701015d3752f28563b22a48fb9b0cd75f564d91f64de96fdf4f06d,2025-06-12T16:06:47.857000 CVE-2025-5886,0,0,3c370f407647cd8c5653d7e07db201df99ace9cd9a0764fcf19e96966f656527,2025-06-20T14:51:42.380000 @@ -299185,22 +299185,22 @@ CVE-2025-6362,0,0,697d7f1867088a607b2bb6f80478a399605c6d472b8b7deef6ee5cf6255a5e CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000 CVE-2025-6364,0,0,a772d9316a89b2b84d2d2b901de4c311092670edabd0ba75a32d20026c9cadaf,2025-06-23T20:16:21.633000 CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000 -CVE-2025-6367,0,1,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000 -CVE-2025-6368,0,1,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000 -CVE-2025-6369,0,1,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000 -CVE-2025-6370,0,1,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000 -CVE-2025-6371,0,1,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000 -CVE-2025-6372,0,1,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000 -CVE-2025-6373,0,1,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000 -CVE-2025-6374,0,1,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000 +CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000 +CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000 +CVE-2025-6369,0,0,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000 +CVE-2025-6370,0,0,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000 +CVE-2025-6371,0,0,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000 +CVE-2025-6372,0,0,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000 +CVE-2025-6373,0,0,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000 +CVE-2025-6374,0,0,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000 CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c5103e,2025-06-23T20:16:21.633000 CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000 CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000 -CVE-2025-6394,0,1,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000 -CVE-2025-6399,0,1,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000 -CVE-2025-6400,0,1,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000 -CVE-2025-6401,0,1,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000 -CVE-2025-6402,0,1,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000 +CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000 +CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000 +CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000 +CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000 +CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000 CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000 CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000 CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000 @@ -299217,8 +299217,8 @@ CVE-2025-6415,0,0,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c3 CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000 CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000 CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000 -CVE-2025-6419,0,1,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000 -CVE-2025-6420,0,1,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000 +CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000 +CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000 CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000 CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000 CVE-2025-6424,0,0,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000 @@ -299235,6 +299235,7 @@ CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7 CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 CVE-2025-6436,0,0,b655c6d628ece84d2581d41deda59948052e0591127f35cfcba6d4941af2d6a1,2025-06-25T14:15:25.260000 CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000 +CVE-2025-6443,1,1,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000 CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000 CVE-2025-6445,0,0,c4d022822323925bc49f742249f5576d460d2c00c9d8f44065d3325e11103521,2025-06-25T18:15:24.610000 CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000 @@ -299248,7 +299249,7 @@ CVE-2025-6453,0,0,fd00a509fde83ffb8dc87e91d1ef6f6a42205887332904c731c5e5cfca51f7 CVE-2025-6455,0,0,265d0815d428cc0332c6f668217ec8a1936104b978c66942178c340270d7e0ee,2025-06-23T20:16:21.633000 CVE-2025-6456,0,0,f94955378138668eeddcf0643df7e80491ded0e1de5b6f79022b52b828de9738,2025-06-23T20:16:21.633000 CVE-2025-6457,0,0,ebb78003380f70547fbe74682acbe42e81ed1cd074968557a5247b806014978e,2025-06-23T20:16:21.633000 -CVE-2025-6458,0,1,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000 +CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000 CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000 CVE-2025-6467,0,0,7689241b9dd7345290f573e56d1ebc8c10c915268120539591432826a1af4380,2025-06-23T20:16:21.633000 CVE-2025-6468,0,0,1845b4082a91b449a76bde9baa14b86a11a77c0b10b331ab65d3e65c2e23afbb,2025-06-23T20:16:21.633000 @@ -299347,6 +299348,32 @@ CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217c CVE-2025-6620,0,0,5b784a98374fe70ec4a1b100e40e03f67c67a52b666ca8120f8159e1f3e46978,2025-06-25T18:15:25.137000 CVE-2025-6621,0,0,d3f259722de1f035956cfc786c4982bf87b78b61162bd5f14f24e3499d41dc2a,2025-06-25T18:15:25.310000 CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000 -CVE-2025-6664,1,1,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000 -CVE-2025-6665,1,1,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000 +CVE-2025-6640,1,1,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000 +CVE-2025-6641,1,1,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000 +CVE-2025-6642,1,1,717a0241bf1d920f5b89a90101388b8ab2b4edf41dfb87969fcb22ba6d6b5047,2025-06-25T22:15:21.363000 +CVE-2025-6643,1,1,b776494edb6c81037eeb408f4a3f277531847242367d6af89fbfc03e3d38fc01,2025-06-25T22:15:21.487000 +CVE-2025-6644,1,1,4cc34224360ba8c59ae16269062b56b49a1d063afe405b111c1685a0bb65fe60,2025-06-25T22:15:21.617000 +CVE-2025-6645,1,1,5006a229a973d0f34315661726fe83e23fae8d52eef70d2d0ea79c666600ed31,2025-06-25T22:15:21.743000 +CVE-2025-6646,1,1,58e1d29ed6c64c33307bfb638db99fd59758e966a5160d94db366cf77018f961,2025-06-25T22:15:21.887000 +CVE-2025-6647,1,1,50ae35b57509c8c3679a7e1a08ff11abdcb609114cacc39a3cc6a8592eaf9b8a,2025-06-25T22:15:22.027000 +CVE-2025-6648,1,1,f5e84824e248dde3c1c93045cd6d86b9b619cc5fb945ea652093fff19f5033ca,2025-06-25T22:15:22.160000 +CVE-2025-6649,1,1,8d7b735f3796ff1b247608aa43cf77ad22583ebe7f888e226cf191d92db737c1,2025-06-25T22:15:22.307000 +CVE-2025-6650,1,1,898b2147475bddd80ee3c7c408b332c02522cc1702658d1e04ac21ff3bd9a2ce,2025-06-25T22:15:22.443000 +CVE-2025-6651,1,1,65eb6accfde919dbafdfc048ca3b6e1e671586e583ab0702380eb6904d69639d,2025-06-25T22:15:22.580000 +CVE-2025-6652,1,1,6c94832d1ce4132b985e4e3f3eb763dd1ee660cf3fc06c40b0491b6fde9ad113,2025-06-25T22:15:22.720000 +CVE-2025-6653,1,1,09c0e63814f0fc8c8a66adefd65d89ae136874c0e5ac1ecf2f26cd3c0841b849,2025-06-25T22:15:22.870000 +CVE-2025-6654,1,1,5a370473940d96cfaa74c91fdc8ed24c1ca647a6d97f8ba6ed2e98a68a45a243,2025-06-25T22:15:23.047000 +CVE-2025-6655,1,1,af9e84d103f0b15ea567c3f8d6ed52853e353aa20e6750586c20c59aac0d431f,2025-06-25T22:15:23.187000 +CVE-2025-6656,1,1,d256e001ec36e6fe1a6c03ed6fba61176852ff1064dde6308fa787f297655840,2025-06-25T22:15:23.330000 +CVE-2025-6657,1,1,ae3bb21a11c0a7f776050f37d37b67f25f7d079e3c75753fd567041123b806c6,2025-06-25T22:15:23.467000 +CVE-2025-6658,1,1,f05f18d2ef2f67b0419e0ceae9d7aee189ce738409755f8fb69dac19113f2143,2025-06-25T22:15:23.597000 +CVE-2025-6659,1,1,e84b3aa084e1165a6508b21ce9ee4a9722ea9d66559623a4034b89322b4701be,2025-06-25T22:15:23.740000 +CVE-2025-6660,1,1,34e8adfbc8a5e3750638d82f451b12baf6d9c480a876dac97e45583d3597d1ab,2025-06-25T22:15:23.863000 +CVE-2025-6661,1,1,92323326ae62b092992f67dc7f8c5e245ab4cb21eeeb54ceaf45d371bcc897b6,2025-06-25T22:15:23.997000 +CVE-2025-6662,1,1,649299c04ecf045716b034e15ae6b5fc5964ae6f7a610b5854e439030e714d01,2025-06-25T22:15:24.127000 +CVE-2025-6664,0,0,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000 +CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000 +CVE-2025-6667,1,1,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000 +CVE-2025-6668,1,1,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000 +CVE-2025-6669,1,1,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000 CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000