Auto-Update: 2025-06-25T23:55:26.139521+00:00

This commit is contained in:
cad-safe-bot 2025-06-25 23:59:04 +00:00
parent 92599e0796
commit 70cd253cf4
29 changed files with 1993 additions and 91 deletions

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-6443",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:20.960",
"lastModified": "2025-06-25T22:15:20.960",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Mikrotik RouterOS VXLAN Source IP Improper Access Control Vulnerability. This vulnerability allows remote attackers to bypass access restrictions on affected installations of Mikrotik RouterOS. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of remote IP addresses when processing VXLAN traffic. The issue results from the lack of validation of the remote IP address against configured values prior to allowing ingress traffic into the internal network. An attacker can leverage this vulnerability to gain access to internal network resources. Was ZDI-CAN-26415."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
"baseScore": 7.2,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 3.9,
"impactScore": 2.7
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
}
]
}
],
"references": [
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-424/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6640",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.107",
"lastModified": "2025-06-25T22:15:21.107",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26527."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-425/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6641",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.237",
"lastModified": "2025-06-25T22:15:21.237",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26528."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-426/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6642",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.363",
"lastModified": "2025-06-25T22:15:21.363",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26530."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-427/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6643",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.487",
"lastModified": "2025-06-25T22:15:21.487",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26532."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-428/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6644",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.617",
"lastModified": "2025-06-25T22:15:21.617",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26536."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-429/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6645",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.743",
"lastModified": "2025-06-25T22:15:21.743",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26642."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-430/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6646",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:21.887",
"lastModified": "2025-06-25T22:15:21.887",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Use-After-Free Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26643."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-431/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6647",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.027",
"lastModified": "2025-06-25T22:15:22.027",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26644."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-432/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6648",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.160",
"lastModified": "2025-06-25T22:15:22.160",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26671."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-433/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6649",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.307",
"lastModified": "2025-06-25T22:15:22.307",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26709."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-434/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6650",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.443",
"lastModified": "2025-06-25T22:15:22.443",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26712."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-435/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6651",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.580",
"lastModified": "2025-06-25T22:15:22.580",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor JP2 File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JP2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26713."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-436/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6652",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.720",
"lastModified": "2025-06-25T22:15:22.720",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26724."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-437/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6653",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:22.870",
"lastModified": "2025-06-25T22:15:22.870",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26726."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-438/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6654",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.047",
"lastModified": "2025-06-25T22:15:23.047",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26729."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-439/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6655",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.187",
"lastModified": "2025-06-25T22:15:23.187",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26730."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-440/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6656",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.330",
"lastModified": "2025-06-25T22:15:23.330",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26731."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-441/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6657",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.467",
"lastModified": "2025-06-25T22:15:23.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26732."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-442/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6658",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.597",
"lastModified": "2025-06-25T22:15:23.597",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26733."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-444/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6659",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.740",
"lastModified": "2025-06-25T22:15:23.740",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26734."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-445/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6660",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.863",
"lastModified": "2025-06-25T22:15:23.863",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor GIF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of GIF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26763."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-122"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-443/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6661",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:23.997",
"lastModified": "2025-06-25T22:15:23.997",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor App Object Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of App objects. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-26823."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-446/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,60 @@
{
"id": "CVE-2025-6662",
"sourceIdentifier": "zdi-disclosures@trendmicro.com",
"published": "2025-06-25T22:15:24.127",
"lastModified": "2025-06-25T22:15:24.127",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "PDF-XChange Editor PRC File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PRC files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-26985."
}
],
"metrics": {
"cvssMetricV30": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Secondary",
"cvssData": {
"version": "3.0",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"baseScore": 3.3,
"baseSeverity": "LOW",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 1.8,
"impactScore": 1.4
}
]
},
"weaknesses": [
{
"source": "zdi-disclosures@trendmicro.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-125"
}
]
}
],
"references": [
{
"url": "https://www.pdf-xchange.com/support/security-bulletins.html",
"source": "zdi-disclosures@trendmicro.com"
},
{
"url": "https://www.zerodayinitiative.com/advisories/ZDI-25-447/",
"source": "zdi-disclosures@trendmicro.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6667",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T22:15:24.280",
"lastModified": "2025-06-25T22:15:24.280",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Car Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/add_cars.php. The manipulation of the argument image leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 2.8,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"baseScore": 6.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 8.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "CWE-434"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/zzb1388/cve/issues/12",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313880",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313880",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602325",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-6668",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T22:15:24.450",
"lastModified": "2025-06-25T22:15:24.450",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in code-projects Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /php_action/fetchSelectedBrand.php. The manipulation of the argument brandId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 3.9,
"impactScore": 3.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-74"
},
{
"lang": "en",
"value": "CWE-89"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/lijingze-eng/cve/issues/1",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313881",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313881",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602340",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,153 @@
{
"id": "CVE-2025-6669",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-25T23:15:21.310",
"lastModified": "2025-06-25T23:15:21.310",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in gooaclok819 sublinkX up to 1.8. It has been declared as problematic. This vulnerability affects unknown code of the file middlewares/jwt.go. The manipulation with the input sublink leads to use of hard-coded cryptographic key\r . The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.9 is able to address this issue. The patch is identified as 778d26aef723daa58df98c8060c43f5bf5d1b10b. It is recommended to upgrade the affected component."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"baseScore": 3.7,
"baseSeverity": "LOW",
"attackVector": "NETWORK",
"attackComplexity": "HIGH",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.2,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"baseScore": 2.6,
"accessVector": "NETWORK",
"accessComplexity": "HIGH",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
},
"baseSeverity": "LOW",
"exploitabilityScore": 4.9,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-320"
},
{
"lang": "en",
"value": "CWE-321"
}
]
}
],
"references": [
{
"url": "https://github.com/gooaclok819/sublinkX/commit/778d26aef723daa58df98c8060c43f5bf5d1b10b",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/issues/68#issuecomment-2957290524",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/issues/69",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/gooaclok819/sublinkX/releases/tag/1.9",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.313882",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.313882",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.602369",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update ### Last Repository Update
```plain ```plain
2025-06-25T22:00:24.166046+00:00 2025-06-25T23:55:26.139521+00:00
``` ```
### Most recent CVE Modification Timestamp synchronized with NVD ### Most recent CVE Modification Timestamp synchronized with NVD
```plain ```plain
2025-06-25T21:15:21.703000+00:00 2025-06-25T23:15:21.310000+00:00
``` ```
### Last Data Feed Release ### Last Data Feed Release
@ -33,48 +33,44 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs ### Total Number of included CVEs
```plain ```plain
299351 299378
``` ```
### CVEs added in the last Commit ### CVEs added in the last Commit
Recently added CVEs: `4` Recently added CVEs: `27`
- [CVE-2025-36038](CVE-2025/CVE-2025-360xx/CVE-2025-36038.json) (`2025-06-25T21:15:20.447`) - [CVE-2025-6641](CVE-2025/CVE-2025-66xx/CVE-2025-6641.json) (`2025-06-25T22:15:21.237`)
- [CVE-2025-45333](CVE-2025/CVE-2025-453xx/CVE-2025-45333.json) (`2025-06-25T20:15:23.927`) - [CVE-2025-6642](CVE-2025/CVE-2025-66xx/CVE-2025-6642.json) (`2025-06-25T22:15:21.363`)
- [CVE-2025-6664](CVE-2025/CVE-2025-66xx/CVE-2025-6664.json) (`2025-06-25T21:15:21.520`) - [CVE-2025-6643](CVE-2025/CVE-2025-66xx/CVE-2025-6643.json) (`2025-06-25T22:15:21.487`)
- [CVE-2025-6665](CVE-2025/CVE-2025-66xx/CVE-2025-6665.json) (`2025-06-25T21:15:21.703`) - [CVE-2025-6644](CVE-2025/CVE-2025-66xx/CVE-2025-6644.json) (`2025-06-25T22:15:21.617`)
- [CVE-2025-6645](CVE-2025/CVE-2025-66xx/CVE-2025-6645.json) (`2025-06-25T22:15:21.743`)
- [CVE-2025-6646](CVE-2025/CVE-2025-66xx/CVE-2025-6646.json) (`2025-06-25T22:15:21.887`)
- [CVE-2025-6647](CVE-2025/CVE-2025-66xx/CVE-2025-6647.json) (`2025-06-25T22:15:22.027`)
- [CVE-2025-6648](CVE-2025/CVE-2025-66xx/CVE-2025-6648.json) (`2025-06-25T22:15:22.160`)
- [CVE-2025-6649](CVE-2025/CVE-2025-66xx/CVE-2025-6649.json) (`2025-06-25T22:15:22.307`)
- [CVE-2025-6650](CVE-2025/CVE-2025-66xx/CVE-2025-6650.json) (`2025-06-25T22:15:22.443`)
- [CVE-2025-6651](CVE-2025/CVE-2025-66xx/CVE-2025-6651.json) (`2025-06-25T22:15:22.580`)
- [CVE-2025-6652](CVE-2025/CVE-2025-66xx/CVE-2025-6652.json) (`2025-06-25T22:15:22.720`)
- [CVE-2025-6653](CVE-2025/CVE-2025-66xx/CVE-2025-6653.json) (`2025-06-25T22:15:22.870`)
- [CVE-2025-6654](CVE-2025/CVE-2025-66xx/CVE-2025-6654.json) (`2025-06-25T22:15:23.047`)
- [CVE-2025-6655](CVE-2025/CVE-2025-66xx/CVE-2025-6655.json) (`2025-06-25T22:15:23.187`)
- [CVE-2025-6656](CVE-2025/CVE-2025-66xx/CVE-2025-6656.json) (`2025-06-25T22:15:23.330`)
- [CVE-2025-6657](CVE-2025/CVE-2025-66xx/CVE-2025-6657.json) (`2025-06-25T22:15:23.467`)
- [CVE-2025-6658](CVE-2025/CVE-2025-66xx/CVE-2025-6658.json) (`2025-06-25T22:15:23.597`)
- [CVE-2025-6659](CVE-2025/CVE-2025-66xx/CVE-2025-6659.json) (`2025-06-25T22:15:23.740`)
- [CVE-2025-6660](CVE-2025/CVE-2025-66xx/CVE-2025-6660.json) (`2025-06-25T22:15:23.863`)
- [CVE-2025-6661](CVE-2025/CVE-2025-66xx/CVE-2025-6661.json) (`2025-06-25T22:15:23.997`)
- [CVE-2025-6662](CVE-2025/CVE-2025-66xx/CVE-2025-6662.json) (`2025-06-25T22:15:24.127`)
- [CVE-2025-6667](CVE-2025/CVE-2025-66xx/CVE-2025-6667.json) (`2025-06-25T22:15:24.280`)
- [CVE-2025-6668](CVE-2025/CVE-2025-66xx/CVE-2025-6668.json) (`2025-06-25T22:15:24.450`)
- [CVE-2025-6669](CVE-2025/CVE-2025-66xx/CVE-2025-6669.json) (`2025-06-25T23:15:21.310`)
### CVEs modified in the last Commit ### CVEs modified in the last Commit
Recently modified CVEs: `53` Recently modified CVEs: `0`
- [CVE-2024-0769](CVE-2024/CVE-2024-07xx/CVE-2024-0769.json) (`2025-06-25T20:15:22.693`)
- [CVE-2024-11847](CVE-2024/CVE-2024-118xx/CVE-2024-11847.json) (`2025-06-25T20:43:39.567`)
- [CVE-2024-25617](CVE-2024/CVE-2024-256xx/CVE-2024-25617.json) (`2025-06-25T20:51:35.437`)
- [CVE-2024-3566](CVE-2024/CVE-2024-35xx/CVE-2024-3566.json) (`2025-06-25T20:24:12.743`)
- [CVE-2024-54085](CVE-2024/CVE-2024-540xx/CVE-2024-54085.json) (`2025-06-25T20:15:23.737`)
- [CVE-2025-26909](CVE-2025/CVE-2025-269xx/CVE-2025-26909.json) (`2025-06-25T20:47:07.753`)
- [CVE-2025-45055](CVE-2025/CVE-2025-450xx/CVE-2025-45055.json) (`2025-06-25T20:24:56.750`)
- [CVE-2025-5729](CVE-2025/CVE-2025-57xx/CVE-2025-5729.json) (`2025-06-25T20:41:36.720`)
- [CVE-2025-5881](CVE-2025/CVE-2025-58xx/CVE-2025-5881.json) (`2025-06-25T20:26:45.010`)
- [CVE-2025-6367](CVE-2025/CVE-2025-63xx/CVE-2025-6367.json) (`2025-06-25T20:07:04.093`)
- [CVE-2025-6368](CVE-2025/CVE-2025-63xx/CVE-2025-6368.json) (`2025-06-25T20:09:17.983`)
- [CVE-2025-6369](CVE-2025/CVE-2025-63xx/CVE-2025-6369.json) (`2025-06-25T20:09:28.010`)
- [CVE-2025-6370](CVE-2025/CVE-2025-63xx/CVE-2025-6370.json) (`2025-06-25T20:09:39.790`)
- [CVE-2025-6371](CVE-2025/CVE-2025-63xx/CVE-2025-6371.json) (`2025-06-25T20:09:48.163`)
- [CVE-2025-6372](CVE-2025/CVE-2025-63xx/CVE-2025-6372.json) (`2025-06-25T20:09:56.243`)
- [CVE-2025-6373](CVE-2025/CVE-2025-63xx/CVE-2025-6373.json) (`2025-06-25T20:10:16.027`)
- [CVE-2025-6374](CVE-2025/CVE-2025-63xx/CVE-2025-6374.json) (`2025-06-25T20:10:23.920`)
- [CVE-2025-6394](CVE-2025/CVE-2025-63xx/CVE-2025-6394.json) (`2025-06-25T20:12:10.560`)
- [CVE-2025-6399](CVE-2025/CVE-2025-63xx/CVE-2025-6399.json) (`2025-06-25T20:13:30.100`)
- [CVE-2025-6400](CVE-2025/CVE-2025-64xx/CVE-2025-6400.json) (`2025-06-25T20:13:52.420`)
- [CVE-2025-6401](CVE-2025/CVE-2025-64xx/CVE-2025-6401.json) (`2025-06-25T20:14:01.440`)
- [CVE-2025-6402](CVE-2025/CVE-2025-64xx/CVE-2025-6402.json) (`2025-06-25T20:14:57.620`)
- [CVE-2025-6419](CVE-2025/CVE-2025-64xx/CVE-2025-6419.json) (`2025-06-25T20:16:24.850`)
- [CVE-2025-6420](CVE-2025/CVE-2025-64xx/CVE-2025-6420.json) (`2025-06-25T20:16:33.910`)
- [CVE-2025-6458](CVE-2025/CVE-2025-64xx/CVE-2025-6458.json) (`2025-06-25T20:00:54.297`)
## Download and Usage ## Download and Usage

View File

@ -115378,12 +115378,12 @@ CVE-2018-14664,0,0,d39730f8033a2ee7a627fba81a3b8019307724436543d9d2cb40d88008e52
CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000 CVE-2018-14665,0,0,076451960ade3536f9d666010e5c551baea1fab44f5aa6146af2a79687fc0f8f,2024-11-21T03:49:32.780000
CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000 CVE-2018-14666,0,0,0c9776b13d8fa436f05620f3d8ffe2122284ffe2d8e2e104768b720285b6f299,2024-11-21T03:49:32.950000
CVE-2018-14667,0,0,18c36a55cb980d64c9740e6163f509c46ab1d042f2ae71d44b133966d6b42286,2025-01-27T21:56:01.393000 CVE-2018-14667,0,0,18c36a55cb980d64c9740e6163f509c46ab1d042f2ae71d44b133966d6b42286,2025-01-27T21:56:01.393000
CVE-2018-14668,0,1,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000 CVE-2018-14668,0,0,306296c9f94a48a74bd7325363f5e2241c611bc8ab1118b80e0bc39c2ff1f309,2025-06-25T20:48:54.637000
CVE-2018-14669,0,1,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000 CVE-2018-14669,0,0,5b029102819b05bd3ca2d652d87a5384f2cd98f3644c2f91dbf91332c329158f,2025-06-25T20:48:54.637000
CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000 CVE-2018-1467,0,0,c5cab70823379f84ff9be38094e9fac3f9e9fa5210966d2386134aca48101f75,2024-11-21T03:59:53.023000
CVE-2018-14670,0,1,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000 CVE-2018-14670,0,0,8e06847803bf8d53d9d04fba03c2ec144d3d045d09dc741475fcce8cb07f8c86,2025-06-25T20:48:54.637000
CVE-2018-14671,0,1,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000 CVE-2018-14671,0,0,71245174cb444c63e48c94522dbe69ecf7859a711ae2ff47a47cea0fadbf6a8f,2025-06-25T20:48:54.637000
CVE-2018-14672,0,1,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000 CVE-2018-14672,0,0,6d64344ec5ed4b9b5f5e3c0b1121371cbaf5349a320b2dab95031e955019f61c,2025-06-25T20:48:54.637000
CVE-2018-14678,0,0,f956068273933e31d6ddfcb673e2571e4ecfbd81298740cd23e82093d1433341,2024-11-21T03:49:34.110000 CVE-2018-14678,0,0,f956068273933e31d6ddfcb673e2571e4ecfbd81298740cd23e82093d1433341,2024-11-21T03:49:34.110000
CVE-2018-14679,0,0,8c33f62b7ee85a5d12bb315f15fffbcae733e275d9eb70ca0ddb336efbd22595,2024-11-21T03:49:34.277000 CVE-2018-14679,0,0,8c33f62b7ee85a5d12bb315f15fffbcae733e275d9eb70ca0ddb336efbd22595,2024-11-21T03:49:34.277000
CVE-2018-1468,0,0,a55d111a437933d52cea85e7d19b027c43602da2803d0d19de42b38b69380664,2024-11-21T03:59:53.150000 CVE-2018-1468,0,0,a55d111a437933d52cea85e7d19b027c43602da2803d0d19de42b38b69380664,2024-11-21T03:59:53.150000
@ -133078,7 +133078,7 @@ CVE-2019-15020,0,0,630d7b4210c7c67ec4447970e2af28bbd91d420b15614b115818b213675f5
CVE-2019-15021,0,0,08f6b9f98ee1a23c24ca986e8d91253fbf3b5ae0fe4c81104b4c7fb2f3171a65,2024-11-21T04:27:53.323000 CVE-2019-15021,0,0,08f6b9f98ee1a23c24ca986e8d91253fbf3b5ae0fe4c81104b4c7fb2f3171a65,2024-11-21T04:27:53.323000
CVE-2019-15022,0,0,bfe14cca6a1454f3135ff8ba19c810f59836852e186e8d5e44b6d985ab9c1686,2024-11-21T04:27:53.433000 CVE-2019-15022,0,0,bfe14cca6a1454f3135ff8ba19c810f59836852e186e8d5e44b6d985ab9c1686,2024-11-21T04:27:53.433000
CVE-2019-15023,0,0,a4522a188e821023bf5a10c1405274e6c6f969416dcb0b34b4735ed714c95464,2024-11-21T04:27:53.543000 CVE-2019-15023,0,0,a4522a188e821023bf5a10c1405274e6c6f969416dcb0b34b4735ed714c95464,2024-11-21T04:27:53.543000
CVE-2019-15024,0,1,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000 CVE-2019-15024,0,0,17f5daa355697629402ef199a2c89d7ece1ac8bdcad85efa4f03ed02c9aa77c7,2025-06-25T20:48:54.637000
CVE-2019-15025,0,0,0408722231530bdeff3b26c5d9ad910ae11a2ad433f3af63fb91eef40cfe3ae0,2024-11-21T04:27:53.753000 CVE-2019-15025,0,0,0408722231530bdeff3b26c5d9ad910ae11a2ad433f3af63fb91eef40cfe3ae0,2024-11-21T04:27:53.753000
CVE-2019-15026,0,0,1e52ede252a1d82cd4996061eb9935e914a3c75ccd024ed159b8e0001fa02395,2024-11-21T04:27:53.893000 CVE-2019-15026,0,0,1e52ede252a1d82cd4996061eb9935e914a3c75ccd024ed159b8e0001fa02395,2024-11-21T04:27:53.893000
CVE-2019-15027,0,0,50f5c82a84bdcc75e023cd8cb06c8f3d9d7ea2eeb012962db6afd56ae6c2c7da,2024-11-21T04:27:54.050000 CVE-2019-15027,0,0,50f5c82a84bdcc75e023cd8cb06c8f3d9d7ea2eeb012962db6afd56ae6c2c7da,2024-11-21T04:27:54.050000
@ -134430,7 +134430,7 @@ CVE-2019-16531,0,0,172383ab40b6099e9d1216efe38c87beb985f309229e66e7019d6a9d5664b
CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000 CVE-2019-16532,0,0,00c12348ad90d933237a6bedbdad7630b1f2315d42edcbaa9f858b32d02701e3,2024-11-21T04:30:46.607000
CVE-2019-16533,0,0,9981d589cb2c6a2333906e53b2698ea3cb77df81a99c8b000c7e4dc1e8d43edb,2024-11-21T04:30:46.747000 CVE-2019-16533,0,0,9981d589cb2c6a2333906e53b2698ea3cb77df81a99c8b000c7e4dc1e8d43edb,2024-11-21T04:30:46.747000
CVE-2019-16534,0,0,b8cd3a4caf58fff341660dc3f6ae2c9dddebda869ab485c641f77e65f337ec10,2024-11-21T04:30:46.890000 CVE-2019-16534,0,0,b8cd3a4caf58fff341660dc3f6ae2c9dddebda869ab485c641f77e65f337ec10,2024-11-21T04:30:46.890000
CVE-2019-16535,0,1,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000 CVE-2019-16535,0,0,bbefb357b5a7f1b7e2f668a4f44012fda3cfc294462e90ebdafede3cfc08940e,2025-06-25T20:48:54.637000
CVE-2019-16536,0,0,90cf5f987df5fe50a6facccc416c9bb2fcca394e6edd1a8786dcc6a41a983f6d,2025-05-21T20:24:58.133000 CVE-2019-16536,0,0,90cf5f987df5fe50a6facccc416c9bb2fcca394e6edd1a8786dcc6a41a983f6d,2025-05-21T20:24:58.133000
CVE-2019-16538,0,0,995fc2a04e0441c78315e326891241cb00233a90a3d004d795ae3c0385ba5f8d,2024-11-21T04:30:47.140000 CVE-2019-16538,0,0,995fc2a04e0441c78315e326891241cb00233a90a3d004d795ae3c0385ba5f8d,2024-11-21T04:30:47.140000
CVE-2019-16539,0,0,cd64e42a64b00853e655eaaefef2132bb5046e4d97764aa715e2d499543453fa,2024-11-21T04:30:47.253000 CVE-2019-16539,0,0,cd64e42a64b00853e655eaaefef2132bb5046e4d97764aa715e2d499543453fa,2024-11-21T04:30:47.253000
@ -135958,7 +135958,7 @@ CVE-2019-18653,0,0,9ad0273a7789886345d8b3a9496c9d940270f02805e0c0b294001cba0f019
CVE-2019-18654,0,0,fe09ed716299952e52c2713d92ac50f27d174a0dfd3aae1c625c5faf64c6f2bd,2024-11-21T04:33:27.700000 CVE-2019-18654,0,0,fe09ed716299952e52c2713d92ac50f27d174a0dfd3aae1c625c5faf64c6f2bd,2024-11-21T04:33:27.700000
CVE-2019-18655,0,0,658d25000318ccd7567aae6e466e0e954fbb9d01881bd86f814513ddf84eab5e,2024-11-21T04:33:27.837000 CVE-2019-18655,0,0,658d25000318ccd7567aae6e466e0e954fbb9d01881bd86f814513ddf84eab5e,2024-11-21T04:33:27.837000
CVE-2019-18656,0,0,82511e7f8fdf425a3bf2d7a830982da6bc618e9b7a435f4524cb597c07a70f19,2024-11-21T04:33:27.977000 CVE-2019-18656,0,0,82511e7f8fdf425a3bf2d7a830982da6bc618e9b7a435f4524cb597c07a70f19,2024-11-21T04:33:27.977000
CVE-2019-18657,0,1,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000 CVE-2019-18657,0,0,f2c9d74af793c2bc949e045e99546d81366d2e8ee26dfd680ce6396e24700f9d,2025-06-25T20:48:54.637000
CVE-2019-18658,0,0,fdc46359c23f2b7c1a24938d8e51908743f10e8ceb29b22ee29606ef9816156a,2024-11-21T04:33:28.240000 CVE-2019-18658,0,0,fdc46359c23f2b7c1a24938d8e51908743f10e8ceb29b22ee29606ef9816156a,2024-11-21T04:33:28.240000
CVE-2019-18659,0,0,08d331ef6e39172a98c50bea716ac87bbf267eb65904f9af3f52b782feafb419,2024-11-21T04:33:28.370000 CVE-2019-18659,0,0,08d331ef6e39172a98c50bea716ac87bbf267eb65904f9af3f52b782feafb419,2024-11-21T04:33:28.370000
CVE-2019-1866,0,0,111749620e55dff4176608c16008c01c0b9d27eb10f128307a00885840d54a55,2024-11-21T04:37:34.197000 CVE-2019-1866,0,0,111749620e55dff4176608c16008c01c0b9d27eb10f128307a00885840d54a55,2024-11-21T04:37:34.197000
@ -184179,12 +184179,12 @@ CVE-2021-42383,0,0,2ee9d2a61d9456c5eaf2fb0c557413f83e4faf955892e84a5df8156629671
CVE-2021-42384,0,0,7e8c04b966d333d62e0b017466ea1d98d54c47043868c17b44b6be05a4bebe8d,2025-04-23T20:15:35.107000 CVE-2021-42384,0,0,7e8c04b966d333d62e0b017466ea1d98d54c47043868c17b44b6be05a4bebe8d,2025-04-23T20:15:35.107000
CVE-2021-42385,0,0,745f244102209a5fe227a9bac0ec2f4852a18b6c98418307869338b1720a2cff,2025-04-23T20:15:35.277000 CVE-2021-42385,0,0,745f244102209a5fe227a9bac0ec2f4852a18b6c98418307869338b1720a2cff,2025-04-23T20:15:35.277000
CVE-2021-42386,0,0,591b31101e6330b5b685182d1647e7289904afba0033068ce2cdf44c4fb24450,2025-04-23T20:15:35.460000 CVE-2021-42386,0,0,591b31101e6330b5b685182d1647e7289904afba0033068ce2cdf44c4fb24450,2025-04-23T20:15:35.460000
CVE-2021-42387,0,1,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000 CVE-2021-42387,0,0,2d64818530e2f9854d7c67994e0e94ff812cef6a4e22e89c1e09fc7f592adc4f,2025-06-25T20:49:29.357000
CVE-2021-42388,0,1,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000 CVE-2021-42388,0,0,cf2e644a436d3b42e7482765853f40058789fbd75f65cb3ff93b3b500c446c81,2025-06-25T20:49:29.357000
CVE-2021-42389,0,1,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000 CVE-2021-42389,0,0,149e167356221747a8e132a910fdca1c72e388146473283e65c54738b4b531b0,2025-06-25T20:49:29.357000
CVE-2021-4239,0,0,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000 CVE-2021-4239,0,0,c44709de95f89329042e3330581264dab45d88b4e8aaedd20e1b0e334f98d70a,2025-04-14T17:15:24.963000
CVE-2021-42390,0,1,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000 CVE-2021-42390,0,0,43bba0c80bfa01a70e0d1b34fc1b9805e5861e1b6075dd2c687dd00fc9c2381f,2025-06-25T20:49:29.357000
CVE-2021-42391,0,1,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000 CVE-2021-42391,0,0,15cabbb419e371d1561bb4595e099cda484f5f65ecf7fa2908eba7ab8941a005,2025-06-25T20:49:29.357000
CVE-2021-42392,0,0,870225882c86a5e7bbf488d0533fd6b59fe011aabd02ab61e25a117152545425,2024-11-21T06:27:43.510000 CVE-2021-42392,0,0,870225882c86a5e7bbf488d0533fd6b59fe011aabd02ab61e25a117152545425,2024-11-21T06:27:43.510000
CVE-2021-4240,0,0,4429bd83f2c215b32341b9555cc7c8670ede3133a33e9b63173833f246a37aa1,2024-11-21T06:37:12.850000 CVE-2021-4240,0,0,4429bd83f2c215b32341b9555cc7c8670ede3133a33e9b63173833f246a37aa1,2024-11-21T06:37:12.850000
CVE-2021-4241,0,0,b5325a6a01c59d88d77a51dbc7356eda074a5a7826f1bd915437bb9d34df68d3,2024-11-21T06:37:13 CVE-2021-4241,0,0,b5325a6a01c59d88d77a51dbc7356eda074a5a7826f1bd915437bb9d34df68d3,2024-11-21T06:37:13
@ -184777,8 +184777,8 @@ CVE-2021-43300,0,0,c275a930d347cdb6784bf4d4c290a0157a19de2da01da70d69ac53e244def
CVE-2021-43301,0,0,2bc72cab56ffab2ce6cd37e3e4d8b450597d2c665e6be25260a5cf1e724616d5,2024-11-21T06:29:02.293000 CVE-2021-43301,0,0,2bc72cab56ffab2ce6cd37e3e4d8b450597d2c665e6be25260a5cf1e724616d5,2024-11-21T06:29:02.293000
CVE-2021-43302,0,0,a8c15a55cfbf9e62cdebc9c5fd98190b531a584b3c396e13d62427f8146fc0fb,2024-11-21T06:29:02.430000 CVE-2021-43302,0,0,a8c15a55cfbf9e62cdebc9c5fd98190b531a584b3c396e13d62427f8146fc0fb,2024-11-21T06:29:02.430000
CVE-2021-43303,0,0,6041a5ec6e49c0e1266efd8afcd46c540a4f90dc2eb21675d6cc8ebcd07c647c,2024-11-21T06:29:02.567000 CVE-2021-43303,0,0,6041a5ec6e49c0e1266efd8afcd46c540a4f90dc2eb21675d6cc8ebcd07c647c,2024-11-21T06:29:02.567000
CVE-2021-43304,0,1,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000 CVE-2021-43304,0,0,84f1dfb77e401b8e4f25f016bca4853193e53666a3980e9f7bcce855f564cbcc,2025-06-25T20:49:29.357000
CVE-2021-43305,0,1,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000 CVE-2021-43305,0,0,192453bd0ab32e3d84577cf6ea32b7a89fd1b62d63b4fced006e340af5bd15b9,2025-06-25T20:49:29.357000
CVE-2021-43306,0,0,6a3fef953952a7bdb4437e1fddfbd2bd4ca78c0979c6b89226d30cbc090d29bc,2024-11-21T06:29:02.997000 CVE-2021-43306,0,0,6a3fef953952a7bdb4437e1fddfbd2bd4ca78c0979c6b89226d30cbc090d29bc,2024-11-21T06:29:02.997000
CVE-2021-43307,0,0,14ebae75be29f807b3aa1779ce7f5a0b4a03ee6c26fb5b44f61f19b0a0eebecf,2024-11-21T06:29:03.153000 CVE-2021-43307,0,0,14ebae75be29f807b3aa1779ce7f5a0b4a03ee6c26fb5b44f61f19b0a0eebecf,2024-11-21T06:29:03.153000
CVE-2021-43308,0,0,ccf51be70e831efd4c793dc723e15ed0f1b2f4a503c7df8ef2d502699146e7c2,2024-11-21T06:29:03.300000 CVE-2021-43308,0,0,ccf51be70e831efd4c793dc723e15ed0f1b2f4a503c7df8ef2d502699146e7c2,2024-11-21T06:29:03.300000
@ -194361,7 +194361,7 @@ CVE-2022-2476,0,0,81c9fb1c14cc84d08c4f9c473c136cc8337555e7e642a27c92ff41e8f8da6f
CVE-2022-24760,0,0,d0acc93be83ffae24915367b4b6306b79610730fdb80d1da5115674ac1788ae4,2024-11-21T06:51:02.140000 CVE-2022-24760,0,0,d0acc93be83ffae24915367b4b6306b79610730fdb80d1da5115674ac1788ae4,2024-11-21T06:51:02.140000
CVE-2022-24761,0,0,c34ae62f344125ff4ea9aa9ba1c715bd701e6a1651586e2caf640f69cc60bd08,2024-11-21T06:51:02.277000 CVE-2022-24761,0,0,c34ae62f344125ff4ea9aa9ba1c715bd701e6a1651586e2caf640f69cc60bd08,2024-11-21T06:51:02.277000
CVE-2022-24762,0,0,1e3f71fc8314e6dc48d8dee7014fadc06bb1d5982d4291f95134dce1d1915ab1,2024-11-21T06:51:02.423000 CVE-2022-24762,0,0,1e3f71fc8314e6dc48d8dee7014fadc06bb1d5982d4291f95134dce1d1915ab1,2024-11-21T06:51:02.423000
CVE-2022-24763,0,1,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000 CVE-2022-24763,0,0,e2e077e9a22cb70a07b770c252e1d2f94bb91b784e598517e812a45b58737b7a,2025-06-25T21:02:12.310000
CVE-2022-24764,0,0,89dad225dc3b3fa5a60d0bc24b363069e33c3bbc9ad29d8feb19eac5f3cc57a3,2024-11-21T06:51:02.713000 CVE-2022-24764,0,0,89dad225dc3b3fa5a60d0bc24b363069e33c3bbc9ad29d8feb19eac5f3cc57a3,2024-11-21T06:51:02.713000
CVE-2022-24765,0,0,62e773a78a94ad4e8f0d5d21771c5c069d45cca88258c77123b5f178b94d7a4e,2024-11-21T06:51:02.873000 CVE-2022-24765,0,0,62e773a78a94ad4e8f0d5d21771c5c069d45cca88258c77123b5f178b94d7a4e,2024-11-21T06:51:02.873000
CVE-2022-24766,0,0,c21503521909e4d5e7a1a45b1e8f6aa8f913c98fbb2249ec96e3033ab9a9f909,2024-11-21T06:51:03.097000 CVE-2022-24766,0,0,c21503521909e4d5e7a1a45b1e8f6aa8f913c98fbb2249ec96e3033ab9a9f909,2024-11-21T06:51:03.097000
@ -195821,7 +195821,7 @@ CVE-2022-26485,0,0,8097b1d074d17acd7eae94a44c47c1f87ffdd03014852b38d5c09c808f594
CVE-2022-26486,0,0,7ae344cd6b3df6922aa27361efb2c59b455d55877c6f5e8892c25421efeab461,2025-03-21T21:09:05.467000 CVE-2022-26486,0,0,7ae344cd6b3df6922aa27361efb2c59b455d55877c6f5e8892c25421efeab461,2025-03-21T21:09:05.467000
CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000 CVE-2022-26487,0,0,aaa404b9f7bb30cc2e59ec05d3f9f09994f187371705fe9646d8a54450aaab35,2023-11-07T03:45:00.770000
CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000 CVE-2022-26488,0,0,952711c6f20d344fd00e1b04d066dbbb1b0cd08cfffe5b8f11cff8f9566d4b5d,2024-11-21T06:54:02.590000
CVE-2022-26490,0,1,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000 CVE-2022-26490,0,0,487f2a7c31de4daf7e8310a2fd68df5b2fd53f4c52a748f61c17f0331cf310b5,2025-06-25T21:01:34.963000
CVE-2022-26491,0,0,38da9ad5f8ca1df2bbd3c9b754b6557267743f8da9bf7684be3d7f5859475cdd,2024-11-21T06:54:02.903000 CVE-2022-26491,0,0,38da9ad5f8ca1df2bbd3c9b754b6557267743f8da9bf7684be3d7f5859475cdd,2024-11-21T06:54:02.903000
CVE-2022-26493,0,0,45d702f036419d269fa1be80b1c15aefad5472edd9ad6f077804415e4925546a,2024-11-21T06:54:03.060000 CVE-2022-26493,0,0,45d702f036419d269fa1be80b1c15aefad5472edd9ad6f077804415e4925546a,2024-11-21T06:54:03.060000
CVE-2022-26494,0,0,8fff31029f4f5d20b9f41b506f758ae87d7dc4b4175545dfde3497b5681f3b84,2024-11-21T06:54:03.187000 CVE-2022-26494,0,0,8fff31029f4f5d20b9f41b506f758ae87d7dc4b4175545dfde3497b5681f3b84,2024-11-21T06:54:03.187000
@ -197337,7 +197337,7 @@ CVE-2022-28387,0,0,eb0e279e3253748688a24cf7e2bf1beab0ac9d5f4a4ba7e1a89a1ee825658
CVE-2022-28388,0,0,cc7e52d83765ff9c3ba4b28806805b1143b9bd2fa20f4935ad8a0af9de3ecd08,2025-05-05T17:18:07.003000 CVE-2022-28388,0,0,cc7e52d83765ff9c3ba4b28806805b1143b9bd2fa20f4935ad8a0af9de3ecd08,2025-05-05T17:18:07.003000
CVE-2022-28389,0,0,9a742432ea1a7380486c7a56174889f0d1fcedfbfe5886bdd54c249882445b64,2024-11-21T06:57:16.910000 CVE-2022-28389,0,0,9a742432ea1a7380486c7a56174889f0d1fcedfbfe5886bdd54c249882445b64,2024-11-21T06:57:16.910000
CVE-2022-2839,0,0,7fd69894fac20abf0ba8b7d7458b4c5a9161b8193da61a2478addeaba334edf9,2024-11-21T07:01:47.040000 CVE-2022-2839,0,0,7fd69894fac20abf0ba8b7d7458b4c5a9161b8193da61a2478addeaba334edf9,2024-11-21T07:01:47.040000
CVE-2022-28390,0,1,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000 CVE-2022-28390,0,0,43a8899070c83ba42769a98a6b76abcc2a957baac8a5f2822d704de35ed507c5,2025-06-25T21:00:27.730000
CVE-2022-28391,0,0,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000 CVE-2022-28391,0,0,6dd53c9c5e56861e68160464caad34f1d79d98b4be1f3805a77073d0e400718e,2025-06-09T16:15:33.480000
CVE-2022-28394,0,0,e7a9805383fd0b990b4b36a0272f702b26eeba74919c99a35076e386f087840b,2024-11-21T06:57:17.407000 CVE-2022-28394,0,0,e7a9805383fd0b990b4b36a0272f702b26eeba74919c99a35076e386f087840b,2024-11-21T06:57:17.407000
CVE-2022-28396,0,0,30f27ee37312f87644c0b8c627b8a982d1b4843e6ff9c89cb97c3241ed80ec73,2023-11-07T03:45:42.307000 CVE-2022-28396,0,0,30f27ee37312f87644c0b8c627b8a982d1b4843e6ff9c89cb97c3241ed80ec73,2023-11-07T03:45:42.307000
@ -197387,7 +197387,7 @@ CVE-2022-28454,0,0,d2822d1e28973a3d23caad3102bc902e1f70acea584395e8d5f72e28c7656
CVE-2022-2846,0,0,09ca642261916a2545bf5d6e5f44016b0856aefd376fa0d71b5e0d073c258b42,2025-04-15T13:15:48.600000 CVE-2022-2846,0,0,09ca642261916a2545bf5d6e5f44016b0856aefd376fa0d71b5e0d073c258b42,2025-04-15T13:15:48.600000
CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000 CVE-2022-28461,0,0,eeba39462648912bc271d3540feb028bf0e88ed4e46938a4c73d6e50bca2309f,2024-11-21T06:57:23.193000
CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000 CVE-2022-28462,0,0,6d195adf1051f5da9495d4323f8470f7ac3778960c39acdb9c65e7d06dd131d1,2024-11-21T06:57:23.343000
CVE-2022-28463,0,1,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000 CVE-2022-28463,0,0,26dbd09f1cb4590c2b4a290d69102453c391356cfbd871ad3d64602dec9f6f3d,2025-06-25T21:02:38.857000
CVE-2022-28464,0,0,33f750b853983c076550a70464146c516df966bc8df75ea75e320ee3805da710,2024-11-21T06:57:23.640000 CVE-2022-28464,0,0,33f750b853983c076550a70464146c516df966bc8df75ea75e320ee3805da710,2024-11-21T06:57:23.640000
CVE-2022-28467,0,0,e67776d445d5825c647ef55fac1670b0221e19dd076d0530b0628d0dcf3a3642,2024-11-21T06:57:23.780000 CVE-2022-28467,0,0,e67776d445d5825c647ef55fac1670b0221e19dd076d0530b0628d0dcf3a3642,2024-11-21T06:57:23.780000
CVE-2022-28468,0,0,0c7ebeca30b08b36babd861cf60ac0e43258d3bb7987ebd7d656eb02fdbc8a9f,2024-11-21T06:57:23.920000 CVE-2022-28468,0,0,0c7ebeca30b08b36babd861cf60ac0e43258d3bb7987ebd7d656eb02fdbc8a9f,2024-11-21T06:57:23.920000
@ -198021,7 +198021,7 @@ CVE-2022-29200,0,0,54f2472dcb06d942f0eb63eef463805570b2599e2f8b21ee8fce06c3f5eda
CVE-2022-29201,0,0,578af7c064baeb58c25bdd26275c1ec2aba241e393d360d06b839c3c1e719eb3,2024-11-21T06:58:42.103000 CVE-2022-29201,0,0,578af7c064baeb58c25bdd26275c1ec2aba241e393d360d06b839c3c1e719eb3,2024-11-21T06:58:42.103000
CVE-2022-29202,0,0,4d352bb276ee429929a6572f5c446f8fa3eeb9afaadd41837e599235382291eb,2024-11-21T06:58:42.247000 CVE-2022-29202,0,0,4d352bb276ee429929a6572f5c446f8fa3eeb9afaadd41837e599235382291eb,2024-11-21T06:58:42.247000
CVE-2022-29203,0,0,3f7cc3b349cce75f3d4fc2f0873572d398828c5164b322a39fa4e5a94420904b,2024-11-21T06:58:42.410000 CVE-2022-29203,0,0,3f7cc3b349cce75f3d4fc2f0873572d398828c5164b322a39fa4e5a94420904b,2024-11-21T06:58:42.410000
CVE-2022-29204,0,1,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000 CVE-2022-29204,0,0,62ec4c26261781fdb7256fe9275b4f1f3ff4704438c6801c6255b76882db8b32,2025-06-25T21:00:03.170000
CVE-2022-29205,0,0,98046ee38239e28ec5f1eb7a701a7b74a933e66b98f4f06a49728d932773eae9,2024-11-21T06:58:42.727000 CVE-2022-29205,0,0,98046ee38239e28ec5f1eb7a701a7b74a933e66b98f4f06a49728d932773eae9,2024-11-21T06:58:42.727000
CVE-2022-29206,0,0,6239f02ed2583fbba040d415d9bafc3a932f0654c3c3ef185bca6ff3ec251a1d,2024-11-21T06:58:42.890000 CVE-2022-29206,0,0,6239f02ed2583fbba040d415d9bafc3a932f0654c3c3ef185bca6ff3ec251a1d,2024-11-21T06:58:42.890000
CVE-2022-29207,0,0,fa3f7025321b52ea1036720f8d3d993da43b4c478e354c8653faa1f1bd884828,2024-11-21T06:58:43.037000 CVE-2022-29207,0,0,fa3f7025321b52ea1036720f8d3d993da43b4c478e354c8653faa1f1bd884828,2024-11-21T06:58:43.037000
@ -203462,7 +203462,7 @@ CVE-2022-35850,0,0,16e73c68241b6f534026c6ee4057e56acef249b3c4b748cc913bf834de765
CVE-2022-35851,0,0,a2a05b0d9cdd7d7124634027cb913cec2d56c09bcd03e216524c088a8eef3623,2024-11-21T07:11:49.203000 CVE-2022-35851,0,0,a2a05b0d9cdd7d7124634027cb913cec2d56c09bcd03e216524c088a8eef3623,2024-11-21T07:11:49.203000
CVE-2022-35857,0,0,bf2e8e0e7a670eb476ca39ca111c20d4f26f6b599703ae270ac0a918aa325a3e,2024-11-21T07:11:49.337000 CVE-2022-35857,0,0,bf2e8e0e7a670eb476ca39ca111c20d4f26f6b599703ae270ac0a918aa325a3e,2024-11-21T07:11:49.337000
CVE-2022-35858,0,0,e6243c00dac9c8d912d1f1b58e249007048b7f2b48a3842c468d8f283caa70dc,2024-11-21T07:11:49.500000 CVE-2022-35858,0,0,e6243c00dac9c8d912d1f1b58e249007048b7f2b48a3842c468d8f283caa70dc,2024-11-21T07:11:49.500000
CVE-2022-3586,0,1,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000 CVE-2022-3586,0,0,95389a7af59e61bf7be706aaf18438662e3b99269a4f4a50d5142c7eff5df169,2025-06-25T20:59:25.893000
CVE-2022-35860,0,0,e502713bf298de612260da4a57f889043b4b596a2e804b5d0f6a0555a936d503,2025-05-09T15:15:53.687000 CVE-2022-35860,0,0,e502713bf298de612260da4a57f889043b4b596a2e804b5d0f6a0555a936d503,2025-05-09T15:15:53.687000
CVE-2022-35861,0,0,590658b98a2052816e5e9365cb85707c3be5829dc57a485c1bbdcf1151a94bae,2024-11-21T07:11:49.840000 CVE-2022-35861,0,0,590658b98a2052816e5e9365cb85707c3be5829dc57a485c1bbdcf1151a94bae,2024-11-21T07:11:49.840000
CVE-2022-35864,0,0,ea1793aff89748601f3fb19ad93ac0e7e8fdc4b8711c1f4bc888a287cb47ccf4,2024-11-21T07:11:50 CVE-2022-35864,0,0,ea1793aff89748601f3fb19ad93ac0e7e8fdc4b8711c1f4bc888a287cb47ccf4,2024-11-21T07:11:50
@ -207649,7 +207649,7 @@ CVE-2022-41264,0,0,891adf340323623f0abbe985ae9cee1af3c286a239cce6e5d6879977ecb12
CVE-2022-41266,0,0,fbb6118ac0cadec6e8cfa2bf1a753628b56d86104cf336bbb467f9b2dec1b796,2024-11-21T07:22:56.740000 CVE-2022-41266,0,0,fbb6118ac0cadec6e8cfa2bf1a753628b56d86104cf336bbb467f9b2dec1b796,2024-11-21T07:22:56.740000
CVE-2022-41267,0,0,6b0b43be4375c0101f53f6828530ea2410934145ce60641a22307de0a4e92b9f,2024-11-21T07:22:56.897000 CVE-2022-41267,0,0,6b0b43be4375c0101f53f6828530ea2410934145ce60641a22307de0a4e92b9f,2024-11-21T07:22:56.897000
CVE-2022-41268,0,0,2866988d39f0ed9d1413f4d9c58ef831697d081c69beeac4aa2cc289041e429c,2024-11-21T07:22:57.050000 CVE-2022-41268,0,0,2866988d39f0ed9d1413f4d9c58ef831697d081c69beeac4aa2cc289041e429c,2024-11-21T07:22:57.050000
CVE-2022-4127,0,1,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000 CVE-2022-4127,0,0,38b78fc4068225d6558e3fbbcfa27802f396df5cba459e7b4ae2335a929ef0f4,2025-06-25T20:57:40.540000
CVE-2022-41271,0,0,e9c99016c2c540f31040e2265bc82b49e2ef289cdd0c0d0af05e684ecee4cb43,2024-11-21T07:22:57.213000 CVE-2022-41271,0,0,e9c99016c2c540f31040e2265bc82b49e2ef289cdd0c0d0af05e684ecee4cb43,2024-11-21T07:22:57.213000
CVE-2022-41272,0,0,82f39d2cd93b474348b59cc15e10e0b3666cd4025d8bd134f3968d6a4abc44b3,2024-11-21T07:22:57.363000 CVE-2022-41272,0,0,82f39d2cd93b474348b59cc15e10e0b3666cd4025d8bd134f3968d6a4abc44b3,2024-11-21T07:22:57.363000
CVE-2022-41273,0,0,71d4f43c4d8a7f57978231a59fa5adca6a6618734e60991f37cc183b265363ac,2024-11-21T07:22:57.510000 CVE-2022-41273,0,0,71d4f43c4d8a7f57978231a59fa5adca6a6618734e60991f37cc183b265363ac,2024-11-21T07:22:57.510000
@ -207657,7 +207657,7 @@ CVE-2022-41274,0,0,af436b20fca94f8b760fa9b7eee395c98917ed93d45bef5f9ab4a31bf81d8
CVE-2022-41275,0,0,ff4fceb84e1887a91657f550077343488a1de582d9a97a8b2e12d56e6ee90375,2024-11-21T07:22:57.793000 CVE-2022-41275,0,0,ff4fceb84e1887a91657f550077343488a1de582d9a97a8b2e12d56e6ee90375,2024-11-21T07:22:57.793000
CVE-2022-41278,0,0,2b2c19e2ff7a3ed4052e392266101c0faa6d2056411fab379b449fde67e1f631,2024-11-21T07:22:57.933000 CVE-2022-41278,0,0,2b2c19e2ff7a3ed4052e392266101c0faa6d2056411fab379b449fde67e1f631,2024-11-21T07:22:57.933000
CVE-2022-41279,0,0,9a24968e11881a2c66ce99a266d99a561d191394857f9e03fc73079c0147f49f,2024-11-21T07:22:58.073000 CVE-2022-41279,0,0,9a24968e11881a2c66ce99a266d99a561d191394857f9e03fc73079c0147f49f,2024-11-21T07:22:58.073000
CVE-2022-4128,0,1,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000 CVE-2022-4128,0,0,1da411ff8a1404d4b31a0760eb30e54b0c6a3ff771f308eb7c21d7b346fa74f7,2025-06-25T20:57:22.500000
CVE-2022-41280,0,0,3a059c83c1410f9d71d0d689d86c4889ddda928445e6f38c9fae89fe86d15063,2024-11-21T07:22:58.197000 CVE-2022-41280,0,0,3a059c83c1410f9d71d0d689d86c4889ddda928445e6f38c9fae89fe86d15063,2024-11-21T07:22:58.197000
CVE-2022-41281,0,0,e84e6252a6c352d80b00ba9eefe4e798deb46ab8008003688196786dbe2ccaaf,2024-11-21T07:22:58.320000 CVE-2022-41281,0,0,e84e6252a6c352d80b00ba9eefe4e798deb46ab8008003688196786dbe2ccaaf,2024-11-21T07:22:58.320000
CVE-2022-41282,0,0,c563504849e025211b68f72f3701f4be97a1e3a2b4cbbdc059bdb9a910383e60,2024-11-21T07:22:58.443000 CVE-2022-41282,0,0,c563504849e025211b68f72f3701f4be97a1e3a2b4cbbdc059bdb9a910383e60,2024-11-21T07:22:58.443000
@ -222199,7 +222199,7 @@ CVE-2023-26541,0,0,1fe90d75d3ca6bc2c5bcf121b872e8147dab21313109ae6036dcb1ca0eec8
CVE-2023-26542,0,0,d052e95deb4acf3eba2e70144cf72735d44820a992e39ca3aa1f8e74c1be1a2a,2024-11-21T07:51:42.750000 CVE-2023-26542,0,0,d052e95deb4acf3eba2e70144cf72735d44820a992e39ca3aa1f8e74c1be1a2a,2024-11-21T07:51:42.750000
CVE-2023-26543,0,0,b8a2d3a1c4135d93e303408bf47f5d49b290ea8dcd377baad5e20bef063c755f,2024-11-21T07:51:42.870000 CVE-2023-26543,0,0,b8a2d3a1c4135d93e303408bf47f5d49b290ea8dcd377baad5e20bef063c755f,2024-11-21T07:51:42.870000
CVE-2023-26544,0,0,a5cc4cca93a3268fd13238f1943d936ac36c95fdb28714650626cfa9138bdf4a,2025-05-05T16:15:31.337000 CVE-2023-26544,0,0,a5cc4cca93a3268fd13238f1943d936ac36c95fdb28714650626cfa9138bdf4a,2025-05-05T16:15:31.337000
CVE-2023-26545,0,1,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000 CVE-2023-26545,0,0,a91278d1e935fc2d72ae2d20ffa8dce4787e0bd6476365f7fb1e502404b66ba8,2025-06-25T20:54:48.233000
CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000 CVE-2023-26546,0,0,d393f28579a8b7b42ea7b7d9fd569b83c57981d4028d49da1ddca1d3e13a834b,2025-01-30T17:15:13.160000
CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000 CVE-2023-26547,0,0,0e898d47641b3bdb5d261a47de068b8fc9e01d73537f4008103d14e543a0f54e,2024-11-21T07:51:43.463000
CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000 CVE-2023-26548,0,0,15ce4293c22b6acd1e804a581bdc68d6a3adeee6bc3c6be8c87a74e642963647,2024-11-21T07:51:43.580000
@ -228479,7 +228479,7 @@ CVE-2023-34386,0,0,3e21beb4557c98228f588552bee4c4f19f8ee6009689f9ba7ed52ba68790c
CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000 CVE-2023-34387,0,0,7031254c429505ad21579b50a14e61d5326f65b6fb9b28c20ecc7368d099b30a,2024-12-13T15:15:15.423000
CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000 CVE-2023-34388,0,0,8ada4f02e28c933aad8accb1fa844ba15f4b96b844ed5f7db6f2f7659791f3dd,2024-11-21T08:07:09.263000
CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000 CVE-2023-34389,0,0,0053e07969cb197ef103d72413e3df09b0fe796c054d2558b1a87a0e6b018276,2024-11-21T08:07:09.403000
CVE-2023-3439,0,1,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000 CVE-2023-3439,0,0,b70efbf38932d587f4dbc498c0ff791a0d5177eaa21bf422a3c4e45154909169,2025-06-25T20:53:15.413000
CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000 CVE-2023-34390,0,0,bf385404d07f10cd7cb4bebaa52fc316d9dc4147eedd32f71885db8b53be2e41,2024-11-21T08:07:09.550000
CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000 CVE-2023-34391,0,0,2850ce35c525b5e171b8e8917e07263b599ec5a37f54cff304be7640551f4ea5,2024-11-21T08:07:09.713000
CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000 CVE-2023-34392,0,0,d8289ef9b8ee4c730669c475b92ed9638b79be5cddb18576855295bf53608bd1,2024-11-21T08:07:09.853000
@ -242445,7 +242445,7 @@ CVE-2023-52975,0,0,d618879d4658767443c6c40cc8b0f21510acd82494ef8ec138beaa1743320
CVE-2023-52976,0,0,920b841cf197f566a16762901ae16133745217324fe76b492e5135a8e694b9f2,2025-04-15T14:46:18.690000 CVE-2023-52976,0,0,920b841cf197f566a16762901ae16133745217324fe76b492e5135a8e694b9f2,2025-04-15T14:46:18.690000
CVE-2023-52977,0,0,83a4c467fc1ba0915b55cbeefeba187eb18f393c741548cb47f860a97809fba0,2025-04-15T14:49:08.120000 CVE-2023-52977,0,0,83a4c467fc1ba0915b55cbeefeba187eb18f393c741548cb47f860a97809fba0,2025-04-15T14:49:08.120000
CVE-2023-52978,0,0,4f19fce5e67936ceb035c2400709644ce0d690e2038338139ebd3784810de9da,2025-04-15T14:49:22.897000 CVE-2023-52978,0,0,4f19fce5e67936ceb035c2400709644ce0d690e2038338139ebd3784810de9da,2025-04-15T14:49:22.897000
CVE-2023-52979,0,1,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000 CVE-2023-52979,0,0,f7c5aa2b067517ecd7e673868d79ebba0fa297b771d190bb74bf0c3d1bd65ed1,2025-06-25T20:59:20.347000
CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000 CVE-2023-5298,0,0,f53cf1dcb6f115d92d16e5c66372cdfa06b4033bbcfb51673e0e9ae138cbc0c7,2024-11-21T08:41:28.727000
CVE-2023-52980,0,0,4641100b19aa28664d8b14bbb512164aafcca33a6f1cdb080c45653f95d87360,2025-03-28T18:11:49.747000 CVE-2023-52980,0,0,4641100b19aa28664d8b14bbb512164aafcca33a6f1cdb080c45653f95d87360,2025-03-28T18:11:49.747000
CVE-2023-52981,0,0,f164a1046931069724d8fe6fa7ada00d7f4d44532953117d1bb939b180055dbd,2025-03-28T18:11:49.747000 CVE-2023-52981,0,0,f164a1046931069724d8fe6fa7ada00d7f4d44532953117d1bb939b180055dbd,2025-03-28T18:11:49.747000
@ -242930,7 +242930,7 @@ CVE-2023-5627,0,0,7b0bcde2fc0123738866cf0fb88f9c984cb3778e0474460a09010dbb618fe5
CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000 CVE-2023-5629,0,0,e28d7a2b27eaedadc28a8b3e55b4d8c18f3686bf416a3913f0b434adaaf39860,2024-11-21T08:42:09.090000
CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000 CVE-2023-5630,0,0,f5e9251060713ee50c60b5d0c939031cc2fdbb555541afb7c799639a9515e9e8,2024-11-21T08:42:09.240000
CVE-2023-5631,0,0,a32d4f7d333b4d827827657c5a3712653d70de78185cf2b33e4324aacc9a9532,2025-03-19T20:57:50.170000 CVE-2023-5631,0,0,a32d4f7d333b4d827827657c5a3712653d70de78185cf2b33e4324aacc9a9532,2025-03-19T20:57:50.170000
CVE-2023-5632,0,1,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000 CVE-2023-5632,0,0,ad7b6cf965b63dfdad0b176d84c704c8f2d6284e273461aed60802d49ad0affe,2025-06-25T20:53:55.653000
CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000 CVE-2023-5633,0,0,c5c6e36c493a2b0e0118c6e887c62a922c8aaf72b372a42e4ceaffd86bcf1ad5,2024-11-21T08:42:09.727000
CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000 CVE-2023-5634,0,0,b92467be378e123c5643e4c43c8f24e7543e9a477a7a9179871045840b009cf4,2024-11-21T08:42:09.933000
CVE-2023-5635,0,0,9130aaaf5358709df5f45a6848452e24c68955b91bbc32d8c699cf7387a1ea7d,2024-11-21T08:42:10.073000 CVE-2023-5635,0,0,9130aaaf5358709df5f45a6848452e24c68955b91bbc32d8c699cf7387a1ea7d,2024-11-21T08:42:10.073000
@ -243841,7 +243841,7 @@ CVE-2023-6618,0,0,b1d954c5a68bec0b0caaa166229856ec2cf1636713231404f6e21ce6700fc7
CVE-2023-6619,0,0,180316cc6fd360c1cfe418b9baabb68fdbfe5b0679f655882ed55290e60a7e09,2024-11-21T08:44:12.967000 CVE-2023-6619,0,0,180316cc6fd360c1cfe418b9baabb68fdbfe5b0679f655882ed55290e60a7e09,2024-11-21T08:44:12.967000
CVE-2023-6620,0,0,72770b1adae71390029ea1b85f70cbdb0f3e8316f7f77ed555fd07ad7e41632c,2025-06-20T17:15:39.273000 CVE-2023-6620,0,0,72770b1adae71390029ea1b85f70cbdb0f3e8316f7f77ed555fd07ad7e41632c,2025-06-20T17:15:39.273000
CVE-2023-6621,0,0,45d08c0617d753e5518b97154cc5c39ff4b744ffee7076e776268faef7fa9fe7,2025-06-18T16:15:24.997000 CVE-2023-6621,0,0,45d08c0617d753e5518b97154cc5c39ff4b744ffee7076e776268faef7fa9fe7,2025-06-18T16:15:24.997000
CVE-2023-6622,0,1,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000 CVE-2023-6622,0,0,f3cb2d89b02887d6679ab7ef756d8dcc02dced0c538c4b5425ddb487d6eceda7,2025-06-25T20:52:54.067000
CVE-2023-6623,0,0,5e23d369a4a62abc3183aca77bef7c770619331921351e05c3215ceee926bb59,2025-06-11T17:15:39.603000 CVE-2023-6623,0,0,5e23d369a4a62abc3183aca77bef7c770619331921351e05c3215ceee926bb59,2025-06-11T17:15:39.603000
CVE-2023-6624,0,0,14b1d11c7c28372381d833e91bb6e8d6b5ae79a5a2308516320c5eaf260d808d,2024-11-21T08:44:13.620000 CVE-2023-6624,0,0,14b1d11c7c28372381d833e91bb6e8d6b5ae79a5a2308516320c5eaf260d808d,2024-11-21T08:44:13.620000
CVE-2023-6625,0,0,58e71e75bdd7fa9f584144b5454e3e903c5a320d23208fe448d38469c7d632af,2024-11-21T08:44:13.750000 CVE-2023-6625,0,0,58e71e75bdd7fa9f584144b5454e3e903c5a320d23208fe448d38469c7d632af,2024-11-21T08:44:13.750000
@ -245174,7 +245174,7 @@ CVE-2024-0765,0,0,147924df3c2a99e28ac84acf5407b5a7987726a2c64f3e2adccb459d5985f3
CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000 CVE-2024-0766,0,0,8d8b47eb35ac4fbeaf262a06f0eddbbba34c1a2755f916cda469cbece9f642de,2025-01-08T18:43:16.317000
CVE-2024-0767,0,0,a7ee481ab1c66b7c498da64ae1084c6748849512829a473ad9f194f786a0f5bb,2025-01-08T18:42:46.573000 CVE-2024-0767,0,0,a7ee481ab1c66b7c498da64ae1084c6748849512829a473ad9f194f786a0f5bb,2025-01-08T18:42:46.573000
CVE-2024-0768,0,0,91bcda62ea828832b073b37c60b407aec931c03659bedab78b2dbf7b33dc45cb,2025-01-08T18:42:05.587000 CVE-2024-0768,0,0,91bcda62ea828832b073b37c60b407aec931c03659bedab78b2dbf7b33dc45cb,2025-01-08T18:42:05.587000
CVE-2024-0769,0,1,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000 CVE-2024-0769,0,0,14b932e5deb71a65d8550740e2e7eb9c055361f3bfd5ab14fa9b3f868fe764db,2025-06-25T20:15:22.693000
CVE-2024-0770,0,0,aa612333eb176e6028f7918ce18a4aa38bcb21688669aa13f59c2d5bff87865a,2024-11-21T08:47:20.020000 CVE-2024-0770,0,0,aa612333eb176e6028f7918ce18a4aa38bcb21688669aa13f59c2d5bff87865a,2024-11-21T08:47:20.020000
CVE-2024-0771,0,0,787c709b50080c9e3e387feda8598650487f948af1881a094925b288f94ee3c4,2024-11-21T08:47:20.167000 CVE-2024-0771,0,0,787c709b50080c9e3e387feda8598650487f948af1881a094925b288f94ee3c4,2024-11-21T08:47:20.167000
CVE-2024-0772,0,0,11c44bbc7d313553d3abc0d43a5d3567962f2383088d45c3a3c23d148c3e5d5b,2024-11-21T08:47:20.320000 CVE-2024-0772,0,0,11c44bbc7d313553d3abc0d43a5d3567962f2383088d45c3a3c23d148c3e5d5b,2024-11-21T08:47:20.320000
@ -247289,7 +247289,7 @@ CVE-2024-11842,0,0,5d3f7f03aec1de59476cc9102b4d1c2e310d2486baacf5c1e41b3d22ffbb3
CVE-2024-11843,0,0,9148793901924e01d68dcf452624105ccc14c37b642b23610baa1c9335aa6147,2025-06-09T18:43:44.440000 CVE-2024-11843,0,0,9148793901924e01d68dcf452624105ccc14c37b642b23610baa1c9335aa6147,2025-06-09T18:43:44.440000
CVE-2024-11844,0,0,5e2bd026f1a9170eb13fcfd4374039a0f011f60fa687eb9fc0c5045b4e4a3838,2025-06-05T15:47:22.637000 CVE-2024-11844,0,0,5e2bd026f1a9170eb13fcfd4374039a0f011f60fa687eb9fc0c5045b4e4a3838,2025-06-05T15:47:22.637000
CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000 CVE-2024-11846,0,0,6d979cf66f6dd3ee37d22418790e77ab7d59d601391d04e5f4d4d86dc19d9a82,2025-01-02T18:15:15.860000
CVE-2024-11847,0,1,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000 CVE-2024-11847,0,0,f556ba972740f267a0c32dd4a36d0061a4f4911c602b705b1cf50e544fbfcf08,2025-06-25T20:43:39.567000
CVE-2024-11848,0,0,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07af81,2025-01-15T12:15:25.303000 CVE-2024-11848,0,0,00b038ec97041da3d96a4d1023137a9b4c56ef72424f577b99bb6575aa07af81,2025-01-15T12:15:25.303000
CVE-2024-11849,0,0,ea4e74c39269b33a13076f5b8098ba3fb0ae69069c9d1e441cb581898733bba6,2025-05-14T14:19:59.560000 CVE-2024-11849,0,0,ea4e74c39269b33a13076f5b8098ba3fb0ae69069c9d1e441cb581898733bba6,2025-05-14T14:19:59.560000
CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000 CVE-2024-1185,0,0,4ecd1740115bf103fbc8dca69b2cfbb42ac9a6d23eecf86cdd29f9e498ced7fa,2024-11-21T08:49:59.223000
@ -254441,7 +254441,7 @@ CVE-2024-25613,0,0,abce985e14133b1827d84fe10d0f0e73bc7dc20c86542f9557f704b35c6fc
CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0350,2024-11-21T09:01:05.133000 CVE-2024-25614,0,0,13a7a8856bf284fc9ac0997abf2fbf5e80953cc5dd2887e0cf6cede4301a0350,2024-11-21T09:01:05.133000
CVE-2024-25615,0,0,3e410c28204b6057b2d87c48f5a6ad0622058c051d2e03679346238c8235ee4f,2025-03-27T21:15:46.667000 CVE-2024-25615,0,0,3e410c28204b6057b2d87c48f5a6ad0622058c051d2e03679346238c8235ee4f,2025-03-27T21:15:46.667000
CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000 CVE-2024-25616,0,0,23f1e3d797f511dd8af55fd17eeab8ba1d08a015646bc7dfc9dda9383d9762d8,2024-11-21T09:01:05.397000
CVE-2024-25617,0,1,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000 CVE-2024-25617,0,0,55899f2e01f9ae15b18c94990cf3091af8eb2bfe71e1904c00ad8231c8eadb93,2025-06-25T20:51:35.437000
CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000 CVE-2024-25618,0,0,862dbb62cb533dbc9a809a2341e1071b374bc31c8310af52a3e190ab6d238489,2024-12-18T22:27:39.050000
CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000 CVE-2024-25619,0,0,65e8792c42f521220def1d214fdab7a4413c8aa0c59eb9f27d8a798e36118f03,2024-12-18T22:22:01.737000
CVE-2024-2562,0,0,1be18f6a55310d6d77eafd2e7fcba0630b8cfd517bd4ae4c7dcd5022f943b41d,2025-03-05T16:24:43.193000 CVE-2024-2562,0,0,1be18f6a55310d6d77eafd2e7fcba0630b8cfd517bd4ae4c7dcd5022f943b41d,2025-03-05T16:24:43.193000
@ -262147,7 +262147,7 @@ CVE-2024-35656,0,0,3436b0f14b2959bea8fc825a54c64a44f02137bbabc01c234a83c6647cb1e
CVE-2024-35657,0,0,52f2f8b62b52dcfed11b97eb150f334015e1cb23147b79a5bc882cf94990431f,2024-11-21T09:20:35.633000 CVE-2024-35657,0,0,52f2f8b62b52dcfed11b97eb150f334015e1cb23147b79a5bc882cf94990431f,2024-11-21T09:20:35.633000
CVE-2024-35658,0,0,6531be8a731cf210f8bd84cc9a1b5df6c2e6a798e2c62ee057a6ee39f70eade0,2024-11-21T09:20:35.813000 CVE-2024-35658,0,0,6531be8a731cf210f8bd84cc9a1b5df6c2e6a798e2c62ee057a6ee39f70eade0,2024-11-21T09:20:35.813000
CVE-2024-35659,0,0,94fc8c9ecf9cbc329ec09ae9c57c34c10f05c7bc21806e9dc3f5cf5c53370c34,2024-11-26T16:33:20.087000 CVE-2024-35659,0,0,94fc8c9ecf9cbc329ec09ae9c57c34c10f05c7bc21806e9dc3f5cf5c53370c34,2024-11-26T16:33:20.087000
CVE-2024-3566,0,1,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000 CVE-2024-3566,0,0,34c074f75845cc49c44e4029155d1d64351ecf32c06cc9d2177c7447e4fb8b37,2025-06-25T20:24:12.743000
CVE-2024-35660,0,0,8111ea089a01680e2cd609f0bb4784592fc91adaac3d4d051159a4e1a7ab5320,2024-11-26T16:36:34.257000 CVE-2024-35660,0,0,8111ea089a01680e2cd609f0bb4784592fc91adaac3d4d051159a4e1a7ab5320,2024-11-26T16:36:34.257000
CVE-2024-35661,0,0,95c094b7c7a943c2958c2c20974d6ff9a43fb5e9c9a77a59c5c355d443a5c848,2024-11-21T09:20:36.217000 CVE-2024-35661,0,0,95c094b7c7a943c2958c2c20974d6ff9a43fb5e9c9a77a59c5c355d443a5c848,2024-11-21T09:20:36.217000
CVE-2024-35662,0,0,c03d362a1ad5250505aa2f4d9f87b5b0e4e5024055b0ac4cd380c4aac4185ed0,2024-11-21T09:20:36.373000 CVE-2024-35662,0,0,c03d362a1ad5250505aa2f4d9f87b5b0e4e5024055b0ac4cd380c4aac4185ed0,2024-11-21T09:20:36.373000
@ -276341,7 +276341,7 @@ CVE-2024-5408,0,0,fa6b3cfb5fa0c30106c5ac3ea6add5195e2bf0919853555e00f52962c2a69b
CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000 CVE-2024-54082,0,0,65aa9ae45e1268a98d7772f17453032df41f59a165b23f820cdeaede4b477a68,2024-12-23T01:15:07.840000
CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000 CVE-2024-54083,0,0,5fd9cfa9d541ec1d140263f1195469b624b1e1b6173ea5643199f37a0fe69372,2024-12-16T08:15:05.317000
CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000 CVE-2024-54084,0,0,c1aee3e143998bbdc982177558f44486e207fe61fab43f3469a59c234690bf0a,2025-03-11T14:15:22.730000
CVE-2024-54085,0,1,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000 CVE-2024-54085,0,0,f2c29d39e64a56783d706b9a2df35320b3eca713beb86cf6145ecfc4e27fe6ef,2025-06-25T20:15:23.737000
CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000 CVE-2024-54089,0,0,efd2198ce361ea992eb01ea5caf6a93dad81fb83e8cf416236617bce8d42af11,2025-02-11T11:15:15.423000
CVE-2024-5409,0,0,e57e1ade9406d6824e9de4b5fb59a028c0cc0d3b407f2e5791339282678e1347,2025-06-05T15:31:08.950000 CVE-2024-5409,0,0,e57e1ade9406d6824e9de4b5fb59a028c0cc0d3b407f2e5791339282678e1347,2025-06-05T15:31:08.950000
CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000 CVE-2024-54090,0,0,66ce7fba27ae90aef333be57d6145501dc74f76ec68d084b34f2e2ffb0d19de5,2025-02-11T11:15:15.647000
@ -289492,7 +289492,7 @@ CVE-2025-26905,0,0,3fd420b5cf6d35f2394ffb7c8b96279ea5b6a88032aa4ac13abb160d4bcc3
CVE-2025-26906,0,0,7e0543f5675dd4fdfce78418317be0b5c7a02892675c1e6c88e224864ca19833,2025-04-16T13:25:37.340000 CVE-2025-26906,0,0,7e0543f5675dd4fdfce78418317be0b5c7a02892675c1e6c88e224864ca19833,2025-04-16T13:25:37.340000
CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000 CVE-2025-26907,0,0,12cbcc5c8b9c8102e25a8b6b26b7cf51a11f16a102e0d9c393e6b591cd6460db,2025-02-25T15:15:26.263000
CVE-2025-26908,0,0,763803b7c362ec974948dac75bcd81ddbcb27c7125b98d9f0ea263864bc023bc,2025-04-16T13:25:37.340000 CVE-2025-26908,0,0,763803b7c362ec974948dac75bcd81ddbcb27c7125b98d9f0ea263864bc023bc,2025-04-16T13:25:37.340000
CVE-2025-26909,0,1,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000 CVE-2025-26909,0,0,07de82f16d0a4fdbc9c93d867e8501c0f520da73bf3ddb07d2e243f52a4c717a,2025-06-25T20:47:07.753000
CVE-2025-2691,0,0,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000 CVE-2025-2691,0,0,3e0c7bb9b74b91cc1c7f226007a0a4b2765523a838b6451534f4d7af5747b3db,2025-03-26T15:06:35.310000
CVE-2025-26910,0,0,b833418b0d88c01a32fb19919d336b1e87e068a486abb348014bd54f3dc7a322,2025-05-21T18:22:55.520000 CVE-2025-26910,0,0,b833418b0d88c01a32fb19919d336b1e87e068a486abb348014bd54f3dc7a322,2025-05-21T18:22:55.520000
CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000 CVE-2025-26911,0,0,69bc9028618de684f0fd93e47f869e941f72b06df9e8d8d5b5d7c83ef9d05729,2025-02-25T15:15:26.393000
@ -293913,7 +293913,7 @@ CVE-2025-36004,0,0,9607d479475c4db7f6c6570a9fe36d71d16713a1fc60b5c59ba5c3e48b0a3
CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000 CVE-2025-36016,0,0,af37919821fdd574b942ee9d20d1ecfb430b58097892e9a643523ecf7010f2dd,2025-06-23T20:16:21.633000
CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000 CVE-2025-3602,0,0,9dae34871a5aa21ddbebfa01b8417ba4c26394066febdada550c394e6505596c,2025-06-17T20:50:23.507000
CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000 CVE-2025-3603,0,0,8fc219493265409dea0354ed582a157fa1e4783601045e446f4ea74d7c8f20d5,2025-04-29T13:52:47.470000
CVE-2025-36038,1,1,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000 CVE-2025-36038,0,0,e4c8aeae6367e00384d7c03d87fbf7b5baef8a8ffd1e7742fe5bb589d5599466,2025-06-25T21:15:20.447000
CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000 CVE-2025-3604,0,0,07d89cc421108391d0d00a1dbe62611cc85596ef2f0a6ad665200edb2fc067bb,2025-04-29T13:52:47.470000
CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000 CVE-2025-36041,0,0,11b57158081d8cfc9ecc1117a15361007f166439f866b0246174b70d871a2d46,2025-06-16T12:32:18.840000
CVE-2025-36048,0,0,48d28565b5a5dac8864125e4e10278da8c90f89c017b04d11826768d7560018f,2025-06-23T20:16:59.783000 CVE-2025-36048,0,0,48d28565b5a5dac8864125e4e10278da8c90f89c017b04d11826768d7560018f,2025-06-23T20:16:59.783000
@ -295758,7 +295758,7 @@ CVE-2025-4503,0,0,85f8ea7af4d81365d4c769cefc49de185f192dc2edd583f57e3e7fc284a882
CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000 CVE-2025-4504,0,0,f39a2a3f679765bc9c2c6ee848dc7fb913ca841c89fbba4626c8dd3bc0803ed4,2025-05-16T13:46:04.210000
CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000 CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47455,2025-05-07T16:39:20.990000
CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000 CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000
CVE-2025-45055,0,1,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000 CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000
CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000 CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000
CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000 CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000
CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000 CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000
@ -295794,7 +295794,7 @@ CVE-2025-45322,0,0,bd98baac9032c4924e89f536321099d3c4e9b0a26b0e91693b82dcae0f7fc
CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000 CVE-2025-4533,0,0,958714e8219e4b36bf6a5171f1844fbafd960204dc55ae1eaffcf3377f047967,2025-05-12T17:32:32.760000
CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000 CVE-2025-45331,0,0,1a763087f3a9266aa4ad598d9cc797aba7ebe6d738e262c7bb0a83be881654a7,2025-06-24T16:15:28.007000
CVE-2025-45332,0,0,dad5ffe999fc406a7d4a0195ad5397b0fdf97a2b911d2dd9b5e5157c4c9992c1,2025-06-25T19:15:23.110000 CVE-2025-45332,0,0,dad5ffe999fc406a7d4a0195ad5397b0fdf97a2b911d2dd9b5e5157c4c9992c1,2025-06-25T19:15:23.110000
CVE-2025-45333,1,1,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000 CVE-2025-45333,0,0,94585daa95f4f9cd37907277300dc534db5fb71804a842016cee692b102a8a53,2025-06-25T20:15:23.927000
CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000 CVE-2025-4534,0,0,d56048b96631b6a170c2f4a1ae209f80a8905f2c01c2315ddf151590a444fbdb,2025-05-12T17:32:32.760000
CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000 CVE-2025-45343,0,0,7615694706f3e006934d6364d7caac354737a6562145f3bc3ab74518e76c62f3,2025-06-03T15:36:32.347000
CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000 CVE-2025-4535,0,0,211c420ea7fc40b2c6369c81b50b72179abd6b1518746dfb87b4fb36af845bbb,2025-05-12T17:32:32.760000
@ -298784,7 +298784,7 @@ CVE-2025-5725,0,0,50b90d1f6262d6199a4112ec7f62ca2f6a6af71fa34d8c551ddb2ea5f71b3c
CVE-2025-5726,0,0,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000 CVE-2025-5726,0,0,ee7c2168fc4df99ae26ff1928c673572570d2b73b7f2f8583cd52149422b0edf,2025-06-10T19:31:01.250000
CVE-2025-5727,0,0,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000 CVE-2025-5727,0,0,233f39774007ec048ab823ce132d5d9a0383f240e79c4b766b8268e460e699b9,2025-06-10T19:30:49.890000
CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000 CVE-2025-5728,0,0,a2734432c6d5c9718e73264aec800c40d10a3b1f503cc6a36bad0f61d236849e,2025-06-10T14:58:21.970000
CVE-2025-5729,0,1,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000 CVE-2025-5729,0,0,cbf15c12a32ee71e58b14fb7ddeab4ea9839aa7fe6f43bb43e4a6224f7c4508f,2025-06-25T20:41:36.720000
CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000 CVE-2025-5732,0,0,e44c4abf488eb73f34cf4fc12053fa1034be5ba1cd633b45abb888bfd8cfede8,2025-06-10T14:58:00.633000
CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000 CVE-2025-5733,0,0,f9414f378c72883d276dec17aff75405246e3e34329518fe5887772f8c216d63,2025-06-06T14:07:28.330000
CVE-2025-5734,0,0,7cdd81331c25c23698c2a802d4084a8a8caa095eaafc613e4054697ce885751f,2025-06-17T20:38:23.730000 CVE-2025-5734,0,0,7cdd81331c25c23698c2a802d4084a8a8caa095eaafc613e4054697ce885751f,2025-06-17T20:38:23.730000
@ -298892,7 +298892,7 @@ CVE-2025-5876,0,0,32a8af4e9cd8f7d2c246abe46c081e26ff3051e42e928a128210a8c01026ea
CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000 CVE-2025-5877,0,0,e0dce4f1c575be2988ae468fd3b9f298d5610dc4a16b678a804d86d9b1adf31b,2025-06-12T16:06:47.857000
CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000 CVE-2025-5879,0,0,756604528009a19f95fc6aaf90273ff5d2ceec0a3e555d776ee81b7d6b78c298,2025-06-12T16:06:47.857000
CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000 CVE-2025-5880,0,0,30053a977ddbe5e71c046af93902c42d00bc2985c0890b6525775f4d57544340,2025-06-12T16:06:47.857000
CVE-2025-5881,0,1,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000 CVE-2025-5881,0,0,3438668634295d42105deec2767619dff3476990785eaa8f8d6da73c06db318c,2025-06-25T20:26:45.010000
CVE-2025-5884,0,0,6f97e7d8567e734c8ac9f93916acf149d9708c4c785c1dfc432cd6c4214fc90b,2025-06-12T16:06:47.857000 CVE-2025-5884,0,0,6f97e7d8567e734c8ac9f93916acf149d9708c4c785c1dfc432cd6c4214fc90b,2025-06-12T16:06:47.857000
CVE-2025-5885,0,0,0a40fefb7d701015d3752f28563b22a48fb9b0cd75f564d91f64de96fdf4f06d,2025-06-12T16:06:47.857000 CVE-2025-5885,0,0,0a40fefb7d701015d3752f28563b22a48fb9b0cd75f564d91f64de96fdf4f06d,2025-06-12T16:06:47.857000
CVE-2025-5886,0,0,3c370f407647cd8c5653d7e07db201df99ace9cd9a0764fcf19e96966f656527,2025-06-20T14:51:42.380000 CVE-2025-5886,0,0,3c370f407647cd8c5653d7e07db201df99ace9cd9a0764fcf19e96966f656527,2025-06-20T14:51:42.380000
@ -299185,22 +299185,22 @@ CVE-2025-6362,0,0,697d7f1867088a607b2bb6f80478a399605c6d472b8b7deef6ee5cf6255a5e
CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000 CVE-2025-6363,0,0,2cbacbb5cc6c904843e22e84139859ddf8eb0282b6eb20c13a55fd99ccbe395c,2025-06-23T20:16:21.633000
CVE-2025-6364,0,0,a772d9316a89b2b84d2d2b901de4c311092670edabd0ba75a32d20026c9cadaf,2025-06-23T20:16:21.633000 CVE-2025-6364,0,0,a772d9316a89b2b84d2d2b901de4c311092670edabd0ba75a32d20026c9cadaf,2025-06-23T20:16:21.633000
CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000 CVE-2025-6365,0,0,6295553fcc137edc7fd1d78ad23ef5d3ffd4b910db1e6b10ac05939d4d2aa7b7,2025-06-23T20:16:21.633000
CVE-2025-6367,0,1,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000 CVE-2025-6367,0,0,bb431b3b23d08c0eaf6da1f3ebee6c3fd3be15fbba72c9deb2782b2a49fd2678,2025-06-25T20:07:04.093000
CVE-2025-6368,0,1,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000 CVE-2025-6368,0,0,126289802a5d0156ea451f7d958f55128ca1a1dddb40c6c6124f3221f79d35cd,2025-06-25T20:09:17.983000
CVE-2025-6369,0,1,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000 CVE-2025-6369,0,0,4187feb2cde6bcc9d06148b06739c8e59691f4fcb04265209e201b0758fabfe1,2025-06-25T20:09:28.010000
CVE-2025-6370,0,1,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000 CVE-2025-6370,0,0,d33774f702419cdd1457ea9fbd6caad660fbed644af794e26dd23c78ba75cc83,2025-06-25T20:09:39.790000
CVE-2025-6371,0,1,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000 CVE-2025-6371,0,0,0a94c5b6f2c8de87b0afb6b9540898e3a2c0f16abf713b5d77d3a930178a3ee2,2025-06-25T20:09:48.163000
CVE-2025-6372,0,1,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000 CVE-2025-6372,0,0,57bd725e58155b22002b2fe27e5ef880df740adaf81477b1018fce26c7c2183a,2025-06-25T20:09:56.243000
CVE-2025-6373,0,1,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000 CVE-2025-6373,0,0,fc3916a56b7bebb7f4afd8db9623b0c0b7ca6d04a407f196c28a44bfa23b9548,2025-06-25T20:10:16.027000
CVE-2025-6374,0,1,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000 CVE-2025-6374,0,0,52c2a3762c3febff3f7133c40521ec4205f6d9bad96026808a9cc8ac3a049376,2025-06-25T20:10:23.920000
CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c5103e,2025-06-23T20:16:21.633000 CVE-2025-6375,0,0,c5c7694dc72a40d77b42ca7bdac2085f0219ee2826ef00eb4a9804c963c5103e,2025-06-23T20:16:21.633000
CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000 CVE-2025-6384,0,0,97aa0c1b3518730f2ff1ac0c6e40e6df53f12abb019ae8c41f191d17b86f6691,2025-06-23T20:16:40.143000
CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000 CVE-2025-6393,0,0,32247b5db96e134f65a8c77173062a4edd972dbb6c0ac396c8f0bf9ce435cde7,2025-06-23T20:16:21.633000
CVE-2025-6394,0,1,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000 CVE-2025-6394,0,0,a6663654d9b1668d091d362eee2cdb7e6cb13133cb16bf86aada9168ce7b98ea,2025-06-25T20:12:10.560000
CVE-2025-6399,0,1,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000 CVE-2025-6399,0,0,1cc4662a693a649a9f407a6e359aaca52fe988ef413a3d7e4dcc120f8e622da2,2025-06-25T20:13:30.100000
CVE-2025-6400,0,1,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000 CVE-2025-6400,0,0,b7834b01ffc76dd6d3a754915f4603e275b0aa9a7826af0f6615e59accec721d,2025-06-25T20:13:52.420000
CVE-2025-6401,0,1,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000 CVE-2025-6401,0,0,5cf4034351d983ee04de416dd673b8a67d86755e6334b356b4bd42e3cd39ff44,2025-06-25T20:14:01.440000
CVE-2025-6402,0,1,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000 CVE-2025-6402,0,0,9fcf059d93a615de79cdd3b74519970d6c73c80b6f86a7557b01dae4c88ad665,2025-06-25T20:14:57.620000
CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000 CVE-2025-6403,0,0,bbcb5e232fc7a419f24c71a04ba268c5b6911e1cbd015d94a543231775d1af9c,2025-06-23T20:16:21.633000
CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000 CVE-2025-6404,0,0,f0c24c4f38cddef26208faf5fffbe2ab0f5998ff0d6d820bde73ac92320b2d1d,2025-06-24T19:33:00.033000
CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000 CVE-2025-6405,0,0,892fa39ea25d0fceb083bcffe5177ecfbe7cb9096e1732c10483f9dee58de891,2025-06-24T19:16:58.253000
@ -299217,8 +299217,8 @@ CVE-2025-6415,0,0,d99b1b62da229a57bb10bf97c0f53cd32822887e7cf2412dbde9d23a1b40c3
CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000 CVE-2025-6416,0,0,d915af97a76985615ef155ac953ed99c7fa06d79c350cbb3611f921c94d13007,2025-06-24T14:42:10.153000
CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000 CVE-2025-6417,0,0,5fc9eb7d4ff925279bc28755909d00f7292cf787d506364151545ca582306f41,2025-06-24T14:41:39.197000
CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000 CVE-2025-6418,0,0,9b7144e8c91e40fad04c7d19d2eb391f7837a4496b68c3a41978c640605253b7,2025-06-24T18:51:41.453000
CVE-2025-6419,0,1,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000 CVE-2025-6419,0,0,3035370a10769e2b2e73a65b80dc5ee8dff995026db0f171ea652406a466dc27,2025-06-25T20:16:24.850000
CVE-2025-6420,0,1,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000 CVE-2025-6420,0,0,9da6d53d9af64779bc447f9508c903bdaaf225194f0f56a912ef73481b378df7,2025-06-25T20:16:33.910000
CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000 CVE-2025-6421,0,0,3169c91105fc051d7d3498fdef6562a4792481aab354e9c38ba63bbee575aace,2025-06-25T19:50:23.227000
CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000 CVE-2025-6422,0,0,b5bb87a55ad52736bcc24be8713e2086821b4454f2e12e2c901389f24f632355,2025-06-25T19:49:55.057000
CVE-2025-6424,0,0,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000 CVE-2025-6424,0,0,704a069dc96dca71fe354883645bea382ab0c9fd3bb7414fe9bdeeaec02801fa,2025-06-25T13:15:26.633000
@ -299235,6 +299235,7 @@ CVE-2025-6434,0,0,25d2270e780cca263d82591b90f92aabefeed0e60517c8b2fc08da412d22a7
CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000 CVE-2025-6435,0,0,21617e43ba2f8a9a35a36e787e5dee004b288295c4b39f0eba8d335f07c49c0b,2025-06-24T14:15:30.930000
CVE-2025-6436,0,0,b655c6d628ece84d2581d41deda59948052e0591127f35cfcba6d4941af2d6a1,2025-06-25T14:15:25.260000 CVE-2025-6436,0,0,b655c6d628ece84d2581d41deda59948052e0591127f35cfcba6d4941af2d6a1,2025-06-25T14:15:25.260000
CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000 CVE-2025-6442,0,0,3e426283a1f1c4580aebeb63e3f6f56b690bd72b6d959535864f9b8a82143dc1,2025-06-25T17:15:40.117000
CVE-2025-6443,1,1,d16bcbf7380cf8685ab0402330d7fcb780db92921035d764bb7de8978decb036,2025-06-25T22:15:20.960000
CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000 CVE-2025-6444,0,0,001723fa0e5477753e66a94b40ca3050bd1b3c324935cd810fadea01384c5f5a,2025-06-25T18:15:24.463000
CVE-2025-6445,0,0,c4d022822323925bc49f742249f5576d460d2c00c9d8f44065d3325e11103521,2025-06-25T18:15:24.610000 CVE-2025-6445,0,0,c4d022822323925bc49f742249f5576d460d2c00c9d8f44065d3325e11103521,2025-06-25T18:15:24.610000
CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000 CVE-2025-6446,0,0,3600b7ecc27e2374ecf53656a0787999f8467a509514c75f50c495fcd2cddda1,2025-06-23T20:16:21.633000
@ -299248,7 +299249,7 @@ CVE-2025-6453,0,0,fd00a509fde83ffb8dc87e91d1ef6f6a42205887332904c731c5e5cfca51f7
CVE-2025-6455,0,0,265d0815d428cc0332c6f668217ec8a1936104b978c66942178c340270d7e0ee,2025-06-23T20:16:21.633000 CVE-2025-6455,0,0,265d0815d428cc0332c6f668217ec8a1936104b978c66942178c340270d7e0ee,2025-06-23T20:16:21.633000
CVE-2025-6456,0,0,f94955378138668eeddcf0643df7e80491ded0e1de5b6f79022b52b828de9738,2025-06-23T20:16:21.633000 CVE-2025-6456,0,0,f94955378138668eeddcf0643df7e80491ded0e1de5b6f79022b52b828de9738,2025-06-23T20:16:21.633000
CVE-2025-6457,0,0,ebb78003380f70547fbe74682acbe42e81ed1cd074968557a5247b806014978e,2025-06-23T20:16:21.633000 CVE-2025-6457,0,0,ebb78003380f70547fbe74682acbe42e81ed1cd074968557a5247b806014978e,2025-06-23T20:16:21.633000
CVE-2025-6458,0,1,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000 CVE-2025-6458,0,0,083518c79650bb4c88fc42ff0fa6cfc761ce82844b15365e5e4b749048d96c50,2025-06-25T20:00:54.297000
CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000 CVE-2025-6466,0,0,02dda139ebc87521cef69d237c47fae4cb16f9d5a4fcba111e2a9a76c60a2e10,2025-06-23T20:16:21.633000
CVE-2025-6467,0,0,7689241b9dd7345290f573e56d1ebc8c10c915268120539591432826a1af4380,2025-06-23T20:16:21.633000 CVE-2025-6467,0,0,7689241b9dd7345290f573e56d1ebc8c10c915268120539591432826a1af4380,2025-06-23T20:16:21.633000
CVE-2025-6468,0,0,1845b4082a91b449a76bde9baa14b86a11a77c0b10b331ab65d3e65c2e23afbb,2025-06-23T20:16:21.633000 CVE-2025-6468,0,0,1845b4082a91b449a76bde9baa14b86a11a77c0b10b331ab65d3e65c2e23afbb,2025-06-23T20:16:21.633000
@ -299347,6 +299348,32 @@ CVE-2025-6619,0,0,5c8159eab9352f8a3543f33ff16bfd3dc7f586f658a3ae25f3220f2ef1217c
CVE-2025-6620,0,0,5b784a98374fe70ec4a1b100e40e03f67c67a52b666ca8120f8159e1f3e46978,2025-06-25T18:15:25.137000 CVE-2025-6620,0,0,5b784a98374fe70ec4a1b100e40e03f67c67a52b666ca8120f8159e1f3e46978,2025-06-25T18:15:25.137000
CVE-2025-6621,0,0,d3f259722de1f035956cfc786c4982bf87b78b61162bd5f14f24e3499d41dc2a,2025-06-25T18:15:25.310000 CVE-2025-6621,0,0,d3f259722de1f035956cfc786c4982bf87b78b61162bd5f14f24e3499d41dc2a,2025-06-25T18:15:25.310000
CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000 CVE-2025-6627,0,0,eea8842b3eb9b3e1cf7456e6d24ea2786dc05d22ee014f3051caf23b6445a606,2025-06-25T19:15:24.260000
CVE-2025-6664,1,1,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000 CVE-2025-6640,1,1,d30e371b0ff3d000e15d9a7d1b5a3f5520079493ac68bf58604fe76ee6d72653,2025-06-25T22:15:21.107000
CVE-2025-6665,1,1,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000 CVE-2025-6641,1,1,e8ff4a93ccd27943e33ffe831881654d963aa2f5a55e6036214c79a67b984675,2025-06-25T22:15:21.237000
CVE-2025-6642,1,1,717a0241bf1d920f5b89a90101388b8ab2b4edf41dfb87969fcb22ba6d6b5047,2025-06-25T22:15:21.363000
CVE-2025-6643,1,1,b776494edb6c81037eeb408f4a3f277531847242367d6af89fbfc03e3d38fc01,2025-06-25T22:15:21.487000
CVE-2025-6644,1,1,4cc34224360ba8c59ae16269062b56b49a1d063afe405b111c1685a0bb65fe60,2025-06-25T22:15:21.617000
CVE-2025-6645,1,1,5006a229a973d0f34315661726fe83e23fae8d52eef70d2d0ea79c666600ed31,2025-06-25T22:15:21.743000
CVE-2025-6646,1,1,58e1d29ed6c64c33307bfb638db99fd59758e966a5160d94db366cf77018f961,2025-06-25T22:15:21.887000
CVE-2025-6647,1,1,50ae35b57509c8c3679a7e1a08ff11abdcb609114cacc39a3cc6a8592eaf9b8a,2025-06-25T22:15:22.027000
CVE-2025-6648,1,1,f5e84824e248dde3c1c93045cd6d86b9b619cc5fb945ea652093fff19f5033ca,2025-06-25T22:15:22.160000
CVE-2025-6649,1,1,8d7b735f3796ff1b247608aa43cf77ad22583ebe7f888e226cf191d92db737c1,2025-06-25T22:15:22.307000
CVE-2025-6650,1,1,898b2147475bddd80ee3c7c408b332c02522cc1702658d1e04ac21ff3bd9a2ce,2025-06-25T22:15:22.443000
CVE-2025-6651,1,1,65eb6accfde919dbafdfc048ca3b6e1e671586e583ab0702380eb6904d69639d,2025-06-25T22:15:22.580000
CVE-2025-6652,1,1,6c94832d1ce4132b985e4e3f3eb763dd1ee660cf3fc06c40b0491b6fde9ad113,2025-06-25T22:15:22.720000
CVE-2025-6653,1,1,09c0e63814f0fc8c8a66adefd65d89ae136874c0e5ac1ecf2f26cd3c0841b849,2025-06-25T22:15:22.870000
CVE-2025-6654,1,1,5a370473940d96cfaa74c91fdc8ed24c1ca647a6d97f8ba6ed2e98a68a45a243,2025-06-25T22:15:23.047000
CVE-2025-6655,1,1,af9e84d103f0b15ea567c3f8d6ed52853e353aa20e6750586c20c59aac0d431f,2025-06-25T22:15:23.187000
CVE-2025-6656,1,1,d256e001ec36e6fe1a6c03ed6fba61176852ff1064dde6308fa787f297655840,2025-06-25T22:15:23.330000
CVE-2025-6657,1,1,ae3bb21a11c0a7f776050f37d37b67f25f7d079e3c75753fd567041123b806c6,2025-06-25T22:15:23.467000
CVE-2025-6658,1,1,f05f18d2ef2f67b0419e0ceae9d7aee189ce738409755f8fb69dac19113f2143,2025-06-25T22:15:23.597000
CVE-2025-6659,1,1,e84b3aa084e1165a6508b21ce9ee4a9722ea9d66559623a4034b89322b4701be,2025-06-25T22:15:23.740000
CVE-2025-6660,1,1,34e8adfbc8a5e3750638d82f451b12baf6d9c480a876dac97e45583d3597d1ab,2025-06-25T22:15:23.863000
CVE-2025-6661,1,1,92323326ae62b092992f67dc7f8c5e245ab4cb21eeeb54ceaf45d371bcc897b6,2025-06-25T22:15:23.997000
CVE-2025-6662,1,1,649299c04ecf045716b034e15ae6b5fc5964ae6f7a610b5854e439030e714d01,2025-06-25T22:15:24.127000
CVE-2025-6664,0,0,4d53d5a9dd9178a2799cb6e12b8d187c7d972a90867842aa034f6c50660d8a2a,2025-06-25T21:15:21.520000
CVE-2025-6665,0,0,2e96d759f6fe88af751c06cee18efb031205cc71a1fb09e794ff8cc45bfaf69e,2025-06-25T21:15:21.703000
CVE-2025-6667,1,1,8d9ad53a3335c05cc0865d1435899d49a25a3ca653a61e0fdb6ad611b59d429a,2025-06-25T22:15:24.280000
CVE-2025-6668,1,1,b7f7ce19d9ba8dfe1a594307d757f6e849bb60917444403b692842e09544abd4,2025-06-25T22:15:24.450000
CVE-2025-6669,1,1,259554a4afe15a633cf6db3e0b294386f75a87b93f6e7e142528c6c7d99925a1,2025-06-25T23:15:21.310000
CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000 CVE-2025-6678,0,0,3d8df884ccaa68204bde970fbc5a3e37b905ea9e2d3ab8e9d4e745c1411dc54e,2025-06-25T18:15:25.507000

Can't render this file because it is too large.