Auto-Update: 2025-06-06T10:00:24.139181+00:00

This commit is contained in:
cad-safe-bot 2025-06-06 10:03:59 +00:00
parent e0f55bdb95
commit 71ae22e976
13 changed files with 1296 additions and 71 deletions

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-3321",
"sourceIdentifier": "productsecurity@bbraun.com",
"published": "2025-06-06T08:15:21.183",
"lastModified": "2025-06-06T08:15:21.183",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A predefined administrative account is not documented and cannot\nbe deactivated. This account cannot be misused from the network, only by local\nusers on the server."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-798"
}
]
}
],
"references": [
{
"url": "https://www.bbraun.com/productsecurity",
"source": "productsecurity@bbraun.com"
}
]
}

View File

@ -0,0 +1,78 @@
{
"id": "CVE-2025-3322",
"sourceIdentifier": "productsecurity@bbraun.com",
"published": "2025-06-06T09:15:23.003",
"lastModified": "2025-06-06T09:15:23.003",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper neutralization of inputs used in expression\nlanguage allows remote code execution with the highest privileges on the\nserver."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"subAvailabilityImpact": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
]
},
"weaknesses": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-917"
}
]
}
],
"references": [
{
"url": "https://www.bbraun.com/productsecurity",
"source": "productsecurity@bbraun.com"
}
]
}

View File

@ -0,0 +1,56 @@
{
"id": "CVE-2025-3365",
"sourceIdentifier": "productsecurity@bbraun.com",
"published": "2025-06-06T09:15:23.203",
"lastModified": "2025-06-06T09:15:23.203",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A missing protection against path traversal allows to access\nany file on the server."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
]
},
"weaknesses": [
{
"source": "productsecurity@bbraun.com",
"type": "Secondary",
"description": [
{
"lang": "en",
"value": "CWE-23"
}
]
}
],
"references": [
{
"url": "https://www.bbraun.com/productsecurity",
"source": "productsecurity@bbraun.com"
}
]
}

View File

@ -9,6 +9,10 @@
{
"lang": "en",
"value": "A vulnerability, which was classified as critical, was found in code-projects Health Center Patient Record Management System 1.0. Affected is an unknown function of the file /birthing_record.php. The manipulation of the argument itr_no leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una vulnerabilidad clasificada como cr\u00edtica en code-projects Health Center Patient Record Management System 1.0. Se ve afectada una funci\u00f3n desconocida del archivo /birthing_record.php. La manipulaci\u00f3n del argumento itr_no provoca una inyecci\u00f3n SQL. El ataque puede ejecutarse en remoto. Se ha hecho p\u00fablico el exploit y puede que sea utilizado."
}
],
"metrics": {

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5732",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T08:15:21.467",
"lastModified": "2025-06-06T08:15:21.467",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability, which was classified as problematic, was found in code-projects Traffic Offense Reporting System 1.0. This affects an unknown part. The manipulation leads to cross-site request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "NONE",
"userInteraction": "PASSIVE",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "REQUIRED",
"scope": "UNCHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"availabilityImpact": "NONE"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"baseScore": 5.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
},
"baseSeverity": "MEDIUM",
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-352"
},
{
"lang": "en",
"value": "CWE-862"
}
]
}
],
"references": [
{
"url": "https://code-projects.org/",
"source": "cna@vuldb.com"
},
{
"url": "https://github.com/tuooo/CVE/issues/3",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311259",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311259",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590598",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5734",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T08:15:21.700",
"lastModified": "2025-06-06T08:15:21.700",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability has been found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This vulnerability affects unknown code of the file /boafrm/formWlanRedirect of the component HTTP POST Request Handler. The manipulation of the argument redirect-url leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/byxs0x0/cve2/blob/main/cvee/1.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311260",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311260",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590615",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5735",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T08:15:21.897",
"lastModified": "2025-06-06T08:15:21.897",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105 and classified as critical. This issue affects some unknown processing of the file /boafrm/formSetLg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/Goo/2.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311261",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311261",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590619",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5736",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T08:15:22.083",
"lastModified": "2025-06-06T08:15:22.083",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been classified as critical. Affected is an unknown function of the file /boafrm/formNtp of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/Goo/3.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311262",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311262",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590620",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5737",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T09:15:23.607",
"lastModified": "2025-06-06T09:15:23.607",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /boafrm/formDosCfg of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/Goo/4.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311263",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311263",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590621",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5738",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T09:15:23.860",
"lastModified": "2025-06-06T09:15:23.860",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in TOTOLINK X15 1.0.0-B20230714.1105. It has been rated as critical. Affected by this issue is some unknown functionality of the file /boafrm/formStats of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/Goo/5.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311264",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311264",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590635",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -0,0 +1,145 @@
{
"id": "CVE-2025-5739",
"sourceIdentifier": "cna@vuldb.com",
"published": "2025-06-06T09:15:24.290",
"lastModified": "2025-06-06T09:15:24.290",
"vulnStatus": "Received",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability classified as critical has been found in TOTOLINK X15 1.0.0-B20230714.1105. This affects an unknown part of the file /boafrm/formSaveConfig of the component HTTP POST Request Handler. The manipulation of the argument submit-url leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
}
],
"metrics": {
"cvssMetricV40": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"subAvailabilityImpact": "NONE",
"exploitMaturity": "PROOF_OF_CONCEPT",
"confidentialityRequirement": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"availabilityRequirement": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"valueDensity": "NOT_DEFINED",
"vulnerabilityResponseEffort": "NOT_DEFINED",
"providerUrgency": "NOT_DEFINED"
}
}
],
"cvssMetricV31": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "LOW",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "cna@vuldb.com",
"type": "Secondary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"baseScore": 9.0,
"accessVector": "NETWORK",
"accessComplexity": "LOW",
"authentication": "SINGLE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.0,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "cna@vuldb.com",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-119"
},
{
"lang": "en",
"value": "CWE-120"
}
]
}
],
"references": [
{
"url": "https://github.com/Lena-lyy/cve/blob/main/Goo/6.md",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?ctiid.311265",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?id.311265",
"source": "cna@vuldb.com"
},
{
"url": "https://vuldb.com/?submit.590636",
"source": "cna@vuldb.com"
},
{
"url": "https://www.totolink.net/",
"source": "cna@vuldb.com"
}
]
}

View File

@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
### Last Repository Update
```plain
2025-06-06T08:00:21.179474+00:00
2025-06-06T10:00:24.139181+00:00
```
### Most recent CVE Modification Timestamp synchronized with NVD
```plain
2025-06-06T07:15:31.133000+00:00
2025-06-06T09:15:24.290000+00:00
```
### Last Data Feed Release
@ -33,46 +33,30 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
### Total Number of included CVEs
```plain
296674
296684
```
### CVEs added in the last Commit
Recently added CVEs: `37`
Recently added CVEs: `10`
- [CVE-2025-48909](CVE-2025/CVE-2025-489xx/CVE-2025-48909.json) (`2025-06-06T07:15:26.593`)
- [CVE-2025-48910](CVE-2025/CVE-2025-489xx/CVE-2025-48910.json) (`2025-06-06T07:15:26.760`)
- [CVE-2025-48911](CVE-2025/CVE-2025-489xx/CVE-2025-48911.json) (`2025-06-06T07:15:26.927`)
- [CVE-2025-4964](CVE-2025/CVE-2025-49xx/CVE-2025-4964.json) (`2025-06-06T07:15:27.603`)
- [CVE-2025-4966](CVE-2025/CVE-2025-49xx/CVE-2025-4966.json) (`2025-06-06T07:15:27.790`)
- [CVE-2025-5018](CVE-2025/CVE-2025-50xx/CVE-2025-5018.json) (`2025-06-06T07:15:27.970`)
- [CVE-2025-5019](CVE-2025/CVE-2025-50xx/CVE-2025-5019.json) (`2025-06-06T07:15:28.157`)
- [CVE-2025-5486](CVE-2025/CVE-2025-54xx/CVE-2025-5486.json) (`2025-06-06T07:15:28.347`)
- [CVE-2025-5533](CVE-2025/CVE-2025-55xx/CVE-2025-5533.json) (`2025-06-06T07:15:28.530`)
- [CVE-2025-5534](CVE-2025/CVE-2025-55xx/CVE-2025-5534.json) (`2025-06-06T07:15:28.727`)
- [CVE-2025-5536](CVE-2025/CVE-2025-55xx/CVE-2025-5536.json) (`2025-06-06T07:15:28.907`)
- [CVE-2025-5538](CVE-2025/CVE-2025-55xx/CVE-2025-5538.json) (`2025-06-06T07:15:29.080`)
- [CVE-2025-5541](CVE-2025/CVE-2025-55xx/CVE-2025-5541.json) (`2025-06-06T07:15:29.280`)
- [CVE-2025-5563](CVE-2025/CVE-2025-55xx/CVE-2025-5563.json) (`2025-06-06T07:15:29.503`)
- [CVE-2025-5565](CVE-2025/CVE-2025-55xx/CVE-2025-5565.json) (`2025-06-06T07:15:29.700`)
- [CVE-2025-5586](CVE-2025/CVE-2025-55xx/CVE-2025-5586.json) (`2025-06-06T07:15:29.880`)
- [CVE-2025-5686](CVE-2025/CVE-2025-56xx/CVE-2025-5686.json) (`2025-06-06T07:15:30.070`)
- [CVE-2025-5699](CVE-2025/CVE-2025-56xx/CVE-2025-5699.json) (`2025-06-06T07:15:30.270`)
- [CVE-2025-5703](CVE-2025/CVE-2025-57xx/CVE-2025-5703.json) (`2025-06-06T07:15:30.463`)
- [CVE-2025-5724](CVE-2025/CVE-2025-57xx/CVE-2025-5724.json) (`2025-06-06T06:15:31.580`)
- [CVE-2025-5725](CVE-2025/CVE-2025-57xx/CVE-2025-5725.json) (`2025-06-06T06:15:32.100`)
- [CVE-2025-5726](CVE-2025/CVE-2025-57xx/CVE-2025-5726.json) (`2025-06-06T06:15:32.303`)
- [CVE-2025-5727](CVE-2025/CVE-2025-57xx/CVE-2025-5727.json) (`2025-06-06T07:15:30.657`)
- [CVE-2025-5728](CVE-2025/CVE-2025-57xx/CVE-2025-5728.json) (`2025-06-06T07:15:30.887`)
- [CVE-2025-5729](CVE-2025/CVE-2025-57xx/CVE-2025-5729.json) (`2025-06-06T07:15:31.133`)
- [CVE-2025-3321](CVE-2025/CVE-2025-33xx/CVE-2025-3321.json) (`2025-06-06T08:15:21.183`)
- [CVE-2025-3322](CVE-2025/CVE-2025-33xx/CVE-2025-3322.json) (`2025-06-06T09:15:23.003`)
- [CVE-2025-3365](CVE-2025/CVE-2025-33xx/CVE-2025-3365.json) (`2025-06-06T09:15:23.203`)
- [CVE-2025-5732](CVE-2025/CVE-2025-57xx/CVE-2025-5732.json) (`2025-06-06T08:15:21.467`)
- [CVE-2025-5734](CVE-2025/CVE-2025-57xx/CVE-2025-5734.json) (`2025-06-06T08:15:21.700`)
- [CVE-2025-5735](CVE-2025/CVE-2025-57xx/CVE-2025-5735.json) (`2025-06-06T08:15:21.897`)
- [CVE-2025-5736](CVE-2025/CVE-2025-57xx/CVE-2025-5736.json) (`2025-06-06T08:15:22.083`)
- [CVE-2025-5737](CVE-2025/CVE-2025-57xx/CVE-2025-5737.json) (`2025-06-06T09:15:23.607`)
- [CVE-2025-5738](CVE-2025/CVE-2025-57xx/CVE-2025-5738.json) (`2025-06-06T09:15:23.860`)
- [CVE-2025-5739](CVE-2025/CVE-2025-57xx/CVE-2025-5739.json) (`2025-06-06T09:15:24.290`)
### CVEs modified in the last Commit
Recently modified CVEs: `2`
Recently modified CVEs: `1`
- [CVE-2025-31171](CVE-2025/CVE-2025-311xx/CVE-2025-31171.json) (`2025-06-06T07:15:25.090`)
- [CVE-2025-4191](CVE-2025/CVE-2025-41xx/CVE-2025-4191.json) (`2025-06-06T07:15:27.087`)
- [CVE-2025-5729](CVE-2025/CVE-2025-57xx/CVE-2025-5729.json) (`2025-06-06T07:15:31.133`)
## Download and Usage

View File

@ -224101,7 +224101,7 @@ CVE-2023-29206,0,0,05757323076564194eb0d2d2908b8334d6e6a978aa54bc6ee226a0d36cc62
CVE-2023-29207,0,0,0af945ef09065db90527ef274d7ce0495ad84a6920d29cd49153411b29baf617,2024-11-21T07:56:42.957000
CVE-2023-29208,0,0,d72b1806b1a1227f32e97378fed3e89636f834684f9c16c8299375c3bb3bce52,2024-11-21T07:56:43.067000
CVE-2023-29209,0,0,b1a441944c74810d18fc5489d956cef09498551551095624d6742251ccaf5fbb,2024-11-21T07:56:43.173000
CVE-2023-2921,1,1,1a7d731e85d883141b07d3d279ef6b7b27b0476a700a0f8210647f7ebffb7b7c,2025-06-06T06:15:30.597000
CVE-2023-2921,0,0,1a7d731e85d883141b07d3d279ef6b7b27b0476a700a0f8210647f7ebffb7b7c,2025-06-06T06:15:30.597000
CVE-2023-29210,0,0,c3845ea336ba86b11c4eb91d03d31293cb5fa7d22a81e37d92159250f0782f95,2024-11-21T07:56:43.280000
CVE-2023-29211,0,0,2c3cbb186baea22a317d036509e1c123cdef6e9162bb76b6980c83b9c51f1fd5,2024-11-21T07:56:43.390000
CVE-2023-29212,0,0,7e4cfc930a4d95e84076cf66c0dc7b198644afe8874cd82ae3f152882ef5d0b8,2024-11-21T07:56:43.500000
@ -278402,7 +278402,7 @@ CVE-2024-58110,0,0,641dae961843e3f416d88441b261a089881d9641b0266741558a2b74760f2
CVE-2024-58111,0,0,e7f16f22506ab98702484e29b0b264af82491b83dea5fddb042a910069929230,2025-05-07T20:15:48.627000
CVE-2024-58112,0,0,60f726caad9effa393a905f9a343246cefb1492679a59aab68341eebfe34f5d0,2025-05-07T20:21:40.357000
CVE-2024-58113,0,0,37d5efe126105105f509f811c1f66010427e6d8dfea43d5348f5a10e754f0d29,2025-05-07T20:15:32.183000
CVE-2024-58114,1,1,70e4d877949741668274aa40d607ab9afad5ef132ad8daf39d2cce1250a4141e,2025-06-06T07:15:24.560000
CVE-2024-58114,0,0,70e4d877949741668274aa40d607ab9afad5ef132ad8daf39d2cce1250a4141e,2025-06-06T07:15:24.560000
CVE-2024-58115,0,0,8ee2d57aa555a84811a17c06b65aa39cf412a6df9d198ae25f7d44238b3b5ce0,2025-05-07T20:37:34.593000
CVE-2024-58116,0,0,f58b4e66b242172378a49c65b24c27c96f9911918be8c66bf34686462ff2d8ae,2025-05-07T20:37:53.310000
CVE-2024-5812,0,0,6925a842f54ea6dbd38d5338f4d1bba7949620aed85abec9f4ea1fe79df642ce,2025-02-11T21:36:43.423000
@ -283748,8 +283748,8 @@ CVE-2025-1771,0,0,c85ae8d5b444fca4235a111290e26baf0c09c1219a46277bdb0b1ec9dbd793
CVE-2025-1773,0,0,10b8afc2b67c1ec534acf6a2e864bcd7ed785a68ced539a560488e697d406767,2025-03-28T15:02:33.313000
CVE-2025-1774,0,0,b7bc9b6d14117ea41567dc2b1ec0413a34cc48ebc3a8f058e66c949851cae578,2025-03-17T15:15:43.523000
CVE-2025-1776,0,0,9f5910c7138c13ec1de71b228a6c2b4d183ead70b893aab7547c66452e55fc54,2025-02-28T14:15:35.943000
CVE-2025-1777,1,1,76029098bf8da4b73ba7b62707c68f3f2a1941a310ad81be86279ab9f24f0d5f,2025-06-06T06:15:31.163000
CVE-2025-1778,1,1,ba98c528d43aaa4023dfac924d5b6b08618128945fd25bb15a8b37cfa3a7776e,2025-06-06T06:15:31.397000
CVE-2025-1777,0,0,76029098bf8da4b73ba7b62707c68f3f2a1941a310ad81be86279ab9f24f0d5f,2025-06-06T06:15:31.163000
CVE-2025-1778,0,0,ba98c528d43aaa4023dfac924d5b6b08618128945fd25bb15a8b37cfa3a7776e,2025-06-06T06:15:31.397000
CVE-2025-1780,0,0,27a42e84da655d8b64968225ee9bb0ae9c4002296681b59ea51446bf623485ad,2025-05-26T01:36:29.360000
CVE-2025-1781,0,0,822d9dd7d94e5b498257a849d2a77ab936366d257a4d3fe0593c5d9951a3a28b,2025-03-28T18:11:40.180000
CVE-2025-1782,0,0,c63bbaca795d770dd3d41b498ef50010308f74d5485f5283e76b3450888c5cab,2025-04-30T18:15:37.500000
@ -290093,7 +290093,7 @@ CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
CVE-2025-29339,0,0,37cf2a028a70e363b59096bf53fd42cd5e9f43c9e6d14e2e5b30f23715c8736c,2025-04-23T14:15:28.957000
CVE-2025-2935,1,1,757a8519dff0b0960bd9eddadc94f93010094963ecd36ffdb6a82af77e32a110,2025-06-06T07:15:24.823000
CVE-2025-2935,0,0,757a8519dff0b0960bd9eddadc94f93010094963ecd36ffdb6a82af77e32a110,2025-06-06T07:15:24.823000
CVE-2025-29357,0,0,eb014a723aa009227f0255b17dfaab32ae69c018e0a2e5c6777057d80a0cac3f,2025-04-02T20:33:45.110000
CVE-2025-29358,0,0,610f6132677edbf66dfcad4906cefbaf7edab86ba5e1c4ae5ea8eda11e0df66d,2025-04-02T20:33:25.387000
CVE-2025-29359,0,0,bc55d7beb5c2520d4a35b3c9d88ad54b81653c8af5ca4e66e75dd78808d6a6dd,2025-04-02T20:33:36.983000
@ -291276,7 +291276,7 @@ CVE-2025-31163,0,0,0d23fc46a79319324af9251b76f99e828668eada4156c0f4488a35318beeb
CVE-2025-31164,0,0,4b001c140896288467c92c772e2ebf8f58e53bdc0e31f0e36dc064cef4c67cc1,2025-04-01T20:26:39.627000
CVE-2025-31165,0,0,890d4b71d79960b8670f39224093c3ef99c7f92edd823784cbe3204f4aa998a2,2025-03-27T16:45:27.850000
CVE-2025-31170,0,0,c3da7797f519ed212ad3546b655748de4a071c1dd7a177d6ab90edafcaedfe9b,2025-05-07T20:46:57.603000
CVE-2025-31171,0,1,4a534626edebc2023d516705ae4ea70b272964868d24a4e37b00e8d466eedd94,2025-06-06T07:15:25.090000
CVE-2025-31171,0,0,4a534626edebc2023d516705ae4ea70b272964868d24a4e37b00e8d466eedd94,2025-06-06T07:15:25.090000
CVE-2025-31172,0,0,90e32b574e57aaae3c88f8457f70e0bd6dfca1d0be15fef48145d614510dc82f,2025-05-07T20:08:51.903000
CVE-2025-31173,0,0,2700554065e1cb73ad11576db038a3f6fd80ed44a1be6e9fcc460b1120bb3ab2,2025-05-07T21:05:41.260000
CVE-2025-31174,0,0,d76e0798a38b9d3731c9101790223eb496cf1566e3e50e96ab78e847bf060e3f,2025-05-07T21:06:10.167000
@ -292809,6 +292809,8 @@ CVE-2025-3315,0,0,1f847c098518c83189dbeef46d9312e1f2d8310d8f0e759ad841eee668fc10
CVE-2025-3316,0,0,3e88a15102379c98d458fd3db7b2ca0fb380819b90213305e7a63c89acf48439,2025-05-07T16:45:57.510000
CVE-2025-3317,0,0,e1db1a1580e9b248a43b6931cce74249339dfb03e962eab3561364c3f8943ace,2025-04-07T14:17:50.220000
CVE-2025-3318,0,0,d41455da27266d28e58c612e5331d057733e012f908834dfd039a0c35f682aa4,2025-04-08T18:54:37.387000
CVE-2025-3321,1,1,665259c10b10d983ac944fa20f78517a3afd6c6ac9ab02f977bd8cc1ed59ebc2,2025-06-06T08:15:21.183000
CVE-2025-3322,1,1,afe2cb5cc0b9302ab4817b582aeb1b5b27efa6f0a7ab0e704ffd9d265bc27ba7,2025-06-06T09:15:23.003000
CVE-2025-3323,0,0,37acfe54a95d00fbd90085f0772424f0e59cecbbefc8d280be8716ab15971168,2025-04-07T18:18:28.467000
CVE-2025-3324,0,0,9e36bef004ef1e608c5124bc62604916196e8cc98749b7cc4f5375d132db9bd5,2025-04-07T18:18:32.793000
CVE-2025-3325,0,0,8f250b2cafb9ee8aca3fb4f5e3dc3f3f5dcd526ad24defe11e4080d28422183c,2025-04-08T18:53:43.787000
@ -292848,6 +292850,7 @@ CVE-2025-3361,0,0,1fe2ec8a64bc635c81624d6e5c98311c550cae1314a855e35bf93ef979c92b
CVE-2025-3362,0,0,f2596ce87f1b2ee767410b87c3d50eab6e0dd63bddff8a5282aeb95847ff2bc3,2025-04-08T18:13:53.347000
CVE-2025-3363,0,0,0bfec75432dde717fba421cd754f82c62be00bc647a979275627a87dda1e3b02,2025-04-08T18:13:53.347000
CVE-2025-3364,0,0,52e815ba5bfb5fe0409468beb50ec169d2973da5550914ad63b94a6a1fadff1c,2025-04-08T18:13:53.347000
CVE-2025-3365,1,1,bb30396b681139f5a78fc47ba478682470ef548fbe58e4a0b17f7e7f033a0d2d,2025-06-06T09:15:23.203000
CVE-2025-3369,0,0,768c6d120f4336ee49db516c38a53d64910a9dd6076d29fe2e2a71d47a523cc1,2025-04-07T14:17:50.220000
CVE-2025-3370,0,0,74146e0f85600cddecef51177ef1b8719970dea37bb456a51b67b4095612a360,2025-05-07T16:07:25.657000
CVE-2025-3371,0,0,6b5716567f8ee22ccd1ad5d811106929fc1bef41b74817967d11ddaca37501a7,2025-05-16T15:01:49.603000
@ -294169,7 +294172,7 @@ CVE-2025-4186,0,0,dab70a09e90dae7c54c24591d73076ac14325c30ca1a211bf9896872e7af04
CVE-2025-4188,0,0,dae4661d96faab4b86b2442932d3ed4a7d5e86b7964e0bf5b5ad937c7ef62825,2025-05-05T20:54:19.760000
CVE-2025-4189,0,0,a0e2a19d22d932ca0e26b1ac038e49b5f17b80b816561f13c2c6e3219b687b6c,2025-05-19T13:35:20.460000
CVE-2025-4190,0,0,4f395a948a9f8a0068a130270d47a0c65aedf94728f2f75941d0b07c1298d467,2025-05-19T16:15:33.407000
CVE-2025-4191,0,1,bbbe8d67bb74bdd05ea1211ceee38512f649d31b51b17b6f1de22c3899d95218,2025-06-06T07:15:27.087000
CVE-2025-4191,0,0,bbbe8d67bb74bdd05ea1211ceee38512f649d31b51b17b6f1de22c3899d95218,2025-06-06T07:15:27.087000
CVE-2025-4192,0,0,f5bd51fdd6a57b3e7b0960a876219c503d94779bf69ab8792a4e156b268d3bfb,2025-05-16T17:39:07.340000
CVE-2025-4193,0,0,43d431ac130cb754304de4c62b810821f57782b8e3f9ada6696d50cdcedddf5d,2025-05-16T17:37:40.313000
CVE-2025-4194,0,0,962435944fa606c9dfc6528593d51587b297f686f224bc6850f700765555ffdc,2025-05-19T13:35:20.460000
@ -296023,17 +296026,17 @@ CVE-2025-48888,0,0,e337e94b85d7a08366e0c5a3cc16b222a86bb1703b8b9d4a80140797b44cc
CVE-2025-48889,0,0,10193c433a4bb6349663dd15365e40e7749e3028945374c079cc00a7a9212044,2025-05-30T16:31:03.107000
CVE-2025-4889,0,0,01c7a8037082d88b5ac656519933c8c5460517579f14e0273e6b2875f7942bab,2025-05-28T15:30:05.053000
CVE-2025-4890,0,0,81e619b8915c0f1194bf5df58e7b0a9363ea517d5998dc711619ba92ff360f3e,2025-05-21T19:37:54.033000
CVE-2025-48902,1,1,51c6ba361b3391fcaaa07eb79c87176f51cec3b0ed0939e6037c6172f56c355d,2025-06-06T07:15:25.360000
CVE-2025-48903,1,1,f6ae229b55430123040e697902b395c49c9ed4d7cf71ee4f04e46fe68a599968,2025-06-06T07:15:25.577000
CVE-2025-48904,1,1,ee08748eaafc1504d72e263a3636ec45e247fb3c6528e1088feaf8f596f7f6f2,2025-06-06T07:15:25.753000
CVE-2025-48905,1,1,8e1725dde9195a346fbba8978954d03ae3b36017663add4c1d6384e8f010d8b9,2025-06-06T07:15:25.927000
CVE-2025-48906,1,1,ec41ae0aa0279bccbb7a227fd5958b4603ddc1331de5e7cd0421b2db32ab1b39,2025-06-06T07:15:26.087000
CVE-2025-48907,1,1,764df93cc9ee4a416ccb5fcc6a374538213c1d5f68b6d9bc89c1701ae45b964b,2025-06-06T07:15:26.253000
CVE-2025-48908,1,1,bbc5bfcba3e06fe09869ec53436edc41efd4f289dcbaf5d30958976aefb2c508,2025-06-06T07:15:26.417000
CVE-2025-48909,1,1,5a54870c55eb996401a3aa1f95d70de35b8e4a1907d567ef5b852fa527b22a41,2025-06-06T07:15:26.593000
CVE-2025-48902,0,0,51c6ba361b3391fcaaa07eb79c87176f51cec3b0ed0939e6037c6172f56c355d,2025-06-06T07:15:25.360000
CVE-2025-48903,0,0,f6ae229b55430123040e697902b395c49c9ed4d7cf71ee4f04e46fe68a599968,2025-06-06T07:15:25.577000
CVE-2025-48904,0,0,ee08748eaafc1504d72e263a3636ec45e247fb3c6528e1088feaf8f596f7f6f2,2025-06-06T07:15:25.753000
CVE-2025-48905,0,0,8e1725dde9195a346fbba8978954d03ae3b36017663add4c1d6384e8f010d8b9,2025-06-06T07:15:25.927000
CVE-2025-48906,0,0,ec41ae0aa0279bccbb7a227fd5958b4603ddc1331de5e7cd0421b2db32ab1b39,2025-06-06T07:15:26.087000
CVE-2025-48907,0,0,764df93cc9ee4a416ccb5fcc6a374538213c1d5f68b6d9bc89c1701ae45b964b,2025-06-06T07:15:26.253000
CVE-2025-48908,0,0,bbc5bfcba3e06fe09869ec53436edc41efd4f289dcbaf5d30958976aefb2c508,2025-06-06T07:15:26.417000
CVE-2025-48909,0,0,5a54870c55eb996401a3aa1f95d70de35b8e4a1907d567ef5b852fa527b22a41,2025-06-06T07:15:26.593000
CVE-2025-4891,0,0,ce5eadb58621294f252fd31aa2b4c3c08be14da6ad289e0467dbab1173f36755,2025-05-27T15:29:23.960000
CVE-2025-48910,1,1,a1afd509fe96f4b5d721737b8707d10863eb3912b002621330f39a48a682a2df,2025-06-06T07:15:26.760000
CVE-2025-48911,1,1,cec89b7dfc146318c148f288473cd855927880ad0b1dc83837dc000419a7f53d,2025-06-06T07:15:26.927000
CVE-2025-48910,0,0,a1afd509fe96f4b5d721737b8707d10863eb3912b002621330f39a48a682a2df,2025-06-06T07:15:26.760000
CVE-2025-48911,0,0,cec89b7dfc146318c148f288473cd855927880ad0b1dc83837dc000419a7f53d,2025-06-06T07:15:26.927000
CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec7244c,2025-06-04T18:29:44.323000
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
CVE-2025-48925,0,0,21a2cb4f4a9620e34d454c14028a00f2b70dc9544a21aca3383488609c689c05,2025-05-29T14:29:50.247000
@ -296153,8 +296156,8 @@ CVE-2025-4948,0,0,2d8928ecccf769064199e618193b5181fd943840af74729dd43fad03a17cb7
CVE-2025-4949,0,0,c11b53f05ae94538ba622256f90c8d8b1286550f417cb15b7dccd733b074e027,2025-05-23T07:15:21.160000
CVE-2025-4951,0,0,8d2965f90ffa46a261e1b06cd533aeb358abbd5115dc1f57a5b34acf12ab582b,2025-05-21T20:25:16.407000
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
CVE-2025-4964,1,1,656c5afe35770d0a2235cb7879cbe0ca3dcffaa3e145e6bd06bddd27612b87ce,2025-06-06T07:15:27.603000
CVE-2025-4966,1,1,161fd3e919a301686e6f1e42fcab5b4eb851e6e0912aebe8bda34dd0c694e63d,2025-06-06T07:15:27.790000
CVE-2025-4964,0,0,656c5afe35770d0a2235cb7879cbe0ca3dcffaa3e145e6bd06bddd27612b87ce,2025-06-06T07:15:27.603000
CVE-2025-4966,0,0,161fd3e919a301686e6f1e42fcab5b4eb851e6e0912aebe8bda34dd0c694e63d,2025-06-06T07:15:27.790000
CVE-2025-4967,0,0,fa5aaf72596dd505e2f8bb43a15bd743497bb32df510d8b3798c90dfaee37959,2025-05-30T16:31:03.107000
CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000
CVE-2025-4971,0,0,ec01b010a198b670732c969d73dfa53bbd76f2e075f866245cc573c614982079,2025-05-21T20:25:16.407000
@ -296188,8 +296191,8 @@ CVE-2025-5010,0,0,93497e2b48b334d59fac1bb8ca9073e5f336f986ef89ce0b89f9db876e65e8
CVE-2025-5011,0,0,d1caeeaa784d143902e41e16fc8809733bc411c4665df188f33764965bcab2ec,2025-05-21T23:15:55.447000
CVE-2025-5013,0,0,9e2206cee3d9a4da13b7d790d61a24286d0c704fc74b7b095d3cf27be2eea613,2025-05-21T23:15:55.563000
CVE-2025-5016,0,0,b9a08e54f0dc13772d502436f2596aa0967ba42878080f55f50a463435bfc853,2025-06-02T17:32:17.397000
CVE-2025-5018,1,1,7dfab08a9475c5b96c87b9dcc5b25cb12afca820e6d65365667a7862063fb4a1,2025-06-06T07:15:27.970000
CVE-2025-5019,1,1,4e2769a90681d727eb7939f1d179352b378b0b141463bc8bdf541c802c050a14,2025-06-06T07:15:28.157000
CVE-2025-5018,0,0,7dfab08a9475c5b96c87b9dcc5b25cb12afca820e6d65365667a7862063fb4a1,2025-06-06T07:15:27.970000
CVE-2025-5019,0,0,4e2769a90681d727eb7939f1d179352b378b0b141463bc8bdf541c802c050a14,2025-06-06T07:15:28.157000
CVE-2025-5020,0,0,8e92e81268cb02470f5321fbe111bd1217491079f6b87fc538686f0917f7768a,2025-05-21T20:24:58.133000
CVE-2025-5024,0,0,ccdd8a7db520a87487d39e567caff85e7e094c68165b88263d5456db37c53d13,2025-05-23T15:55:02.040000
CVE-2025-5025,0,0,d8851777e61365e1aa05e5e547ad31f1c257710ee925f9d10fb7d3665c7bb24a,2025-05-30T17:15:30.200000
@ -296474,7 +296477,7 @@ CVE-2025-5446,0,0,9d168da398a778ce0b0095a7e0a8e3bca462cdb12a826e6bb187c380e071a1
CVE-2025-5447,0,0,a5cb8bc4c7a4de9ae3bfa5d338b695456ece1a5a0b2112b238cb5da4d8fbdcc4,2025-06-02T17:32:17.397000
CVE-2025-5455,0,0,49ebfbc7472b909f08e0e5deb4e4ea5f4cedd298a2046130e62c9603cffb4aad,2025-06-02T17:32:17.397000
CVE-2025-5482,0,0,010176165dc064c9d0f5c42c228b3c1b03d533e2fec3bc43624fb7ad3f4bc0b3,2025-06-04T14:54:33.783000
CVE-2025-5486,1,1,5c4b35712b5e7110eb1bfafff041827c6ab96d34cfe36a0c216dafa8adfbc410,2025-06-06T07:15:28.347000
CVE-2025-5486,0,0,5c4b35712b5e7110eb1bfafff041827c6ab96d34cfe36a0c216dafa8adfbc410,2025-06-06T07:15:28.347000
CVE-2025-5492,0,0,5239a7cb50dec6b348e683d7a6c48897854a921e0d403f100d8eaef90a706bbd,2025-06-04T14:54:33.783000
CVE-2025-5493,0,0,1efa27605551d4754ba55b2a6097a15a4076a1f74a911a4fa864a052324b89ba,2025-06-04T14:54:33.783000
CVE-2025-5495,0,0,119827a376db9a3a9ce1110409fd703f076cb8ae90c38353380ea0b67ec862d6,2025-06-04T14:54:33.783000
@ -296504,12 +296507,12 @@ CVE-2025-5525,0,0,477ad6529ca0081701a09dd27019e99028d161ae7825de60804c5f6a4ef5cb
CVE-2025-5527,0,0,5dead2f90bfa336b299d2790c248c3e2b665e86fc2c3c9c7ff0f4ee35f1af83c,2025-06-04T14:54:33.783000
CVE-2025-5531,0,0,6d27f31038761ad0a1ccad441f88039d5d4e8afb6e2422d32c208713130619d5,2025-06-04T14:54:33.783000
CVE-2025-5532,0,0,d307f7aa5ca0395a7c8a1bde45bdc53cca6e2426e0b9fc80212fdc7f65c5fbe7,2025-06-04T14:54:33.783000
CVE-2025-5533,1,1,e9a4341f4bfcae12d2241b41cf681ad2d09259809ef20b71fd0f9a91f56a8abb,2025-06-06T07:15:28.530000
CVE-2025-5534,1,1,e56e58a109e19da353f22368cd09990dac85acb57d83699262b0278f241d45b9,2025-06-06T07:15:28.727000
CVE-2025-5536,1,1,36e82228d4377ff24ba9e713c06920dd59355061d068aa6d6549c720c115fe4c,2025-06-06T07:15:28.907000
CVE-2025-5538,1,1,68028f6f7691e9204fa1e1790947ea4a9eb60c9ecd1980fa172b0cfb75d8ed44,2025-06-06T07:15:29.080000
CVE-2025-5533,0,0,e9a4341f4bfcae12d2241b41cf681ad2d09259809ef20b71fd0f9a91f56a8abb,2025-06-06T07:15:28.530000
CVE-2025-5534,0,0,e56e58a109e19da353f22368cd09990dac85acb57d83699262b0278f241d45b9,2025-06-06T07:15:28.727000
CVE-2025-5536,0,0,36e82228d4377ff24ba9e713c06920dd59355061d068aa6d6549c720c115fe4c,2025-06-06T07:15:28.907000
CVE-2025-5538,0,0,68028f6f7691e9204fa1e1790947ea4a9eb60c9ecd1980fa172b0cfb75d8ed44,2025-06-06T07:15:29.080000
CVE-2025-5539,0,0,298ac745dff309bfc9c32d271927b52132f95cd6835d223a8ca6e238897e44d1,2025-06-04T14:54:33.783000
CVE-2025-5541,1,1,23c4eec6a38d029a165d1505b65939ad33a6ebcb9066c40f2b3ec1bd7d694ffc,2025-06-06T07:15:29.280000
CVE-2025-5541,0,0,23c4eec6a38d029a165d1505b65939ad33a6ebcb9066c40f2b3ec1bd7d694ffc,2025-06-06T07:15:29.280000
CVE-2025-5542,0,0,d6f73127563d185f85d4ea7483a6651c4389b791fccb5a0f74ef856dec9c4d33,2025-06-04T14:54:33.783000
CVE-2025-5543,0,0,1d8a435ed88a5df21f363a761b25c4a0cbf09f84f022d0fbe70e5e84f11f1af7,2025-06-04T14:54:33.783000
CVE-2025-5544,0,0,020a516e79a3f89efe59dfb651e1ec3f5e799cf4a3d54ccd47ef877829750c60,2025-06-04T14:54:33.783000
@ -296529,8 +296532,8 @@ CVE-2025-5558,0,0,2ac6d8dec4afd7e15c38ca1bcadede5871807c94fd2187d1936fb3e8f723e2
CVE-2025-5560,0,0,9af623a67baf1975e1c266a9dd2b23fb673ba32b97484cf97dfcbc25c8056283,2025-06-04T14:54:33.783000
CVE-2025-5561,0,0,89bf58530abc9290057be65b322800672f7156f0149b4511ecbae6f44f339e6b,2025-06-04T14:54:33.783000
CVE-2025-5562,0,0,343add22f2528d1ab365d74b6c653aeb153b343601b0ebacf12124363f3af2da,2025-06-04T14:54:33.783000
CVE-2025-5563,1,1,9ba007a5aba5914c7afc992f033f345805b01d0cc864ca194a7c0fdace2b7675,2025-06-06T07:15:29.503000
CVE-2025-5565,1,1,3efa99f6546952148f7c0ecd237cd60f6636b777e01abc140255962f39f49736,2025-06-06T07:15:29.700000
CVE-2025-5563,0,0,9ba007a5aba5914c7afc992f033f345805b01d0cc864ca194a7c0fdace2b7675,2025-06-06T07:15:29.503000
CVE-2025-5565,0,0,3efa99f6546952148f7c0ecd237cd60f6636b777e01abc140255962f39f49736,2025-06-06T07:15:29.700000
CVE-2025-5566,0,0,6cd1b19db0a2abdf35ae21538de449c05d1cecfb40c37f0b82d89c2ca9b4dcf9,2025-06-04T14:54:33.783000
CVE-2025-5569,0,0,4c30b6740d26360ebc0aa84c2a25fe04c9749eefc6a71facbba872eca1a65c71,2025-06-04T14:54:33.783000
CVE-2025-5571,0,0,88815a4b21737d58e162800981d93fa4afd05c1cd7a98afd3597a0eeba47b636,2025-06-04T14:54:33.783000
@ -296547,7 +296550,7 @@ CVE-2025-5581,0,0,c54747d4f47de2d53a0450ac3d2803f6b1ce7f3a8f3dd0d32c7ea29ca0ea8b
CVE-2025-5582,0,0,d2f1baa22f55fc38a8f865d0e99938121f7ce9bfb4e6584060e61c164943f9d6,2025-06-04T17:44:37.780000
CVE-2025-5583,0,0,b2ce656eeaab700a8a0873a3d565fbebe88a85c216d85c69e76524b9646991ad,2025-06-04T17:44:26.393000
CVE-2025-5584,0,0,33fb5e30c150aff6fd49d9e5053812971ddea6fb06de04e2dfe2862137521fb0,2025-06-04T14:54:33.783000
CVE-2025-5586,1,1,9c5568e51dc5d2bcfd051b14ad5913d1ba052b4c44a3b163ed9911df016d6a34,2025-06-06T07:15:29.880000
CVE-2025-5586,0,0,9c5568e51dc5d2bcfd051b14ad5913d1ba052b4c44a3b163ed9911df016d6a34,2025-06-06T07:15:29.880000
CVE-2025-5592,0,0,788797f86c46be9691efa8bf5e6ca7f39860f123d70f12f2bbf93e8b3cfcaa8b,2025-06-04T15:15:24.060000
CVE-2025-5593,0,0,2fc870a522f11936dac0dea9ff39b04ab227f9c952baf080bcd9f5e32f30e2b0,2025-06-05T20:12:23.777000
CVE-2025-5594,0,0,b27966499bfacb8dd28a0b76f2459af0a87ee57098cc25d08139feded7c76259,2025-06-05T20:12:23.777000
@ -296635,7 +296638,7 @@ CVE-2025-5679,0,0,59c0e847ad907b313509a8a7262ed706ea6357cc7a8feeba56ceeee73456c7
CVE-2025-5680,0,0,ac61e1c24d8324f72dbb4e75c264ec0155ce51688ab2ace27a8ae029c32873af,2025-06-05T20:15:26.790000
CVE-2025-5683,0,0,1a3b3cb960b03a08fa5b7c4079149ff9fe6c9f4a5d5c8b0f22c43f750a1037ab,2025-06-05T20:12:23.777000
CVE-2025-5685,0,0,059cd6cc5ce733bf6647de7ff24aa5771721f8c52c4a7ad93daf964feb01b718,2025-06-05T20:15:26.993000
CVE-2025-5686,1,1,bc6301a77db1957a9012cb31693e5b573d2ec31b1abea4c579e33a73c67e711b,2025-06-06T07:15:30.070000
CVE-2025-5686,0,0,bc6301a77db1957a9012cb31693e5b573d2ec31b1abea4c579e33a73c67e711b,2025-06-06T07:15:30.070000
CVE-2025-5688,0,0,8859de4a9377955821b5e59f7a118128be39b8ffcd1a35e1ff851cd9073a522a,2025-06-05T20:12:23.777000
CVE-2025-5690,0,0,2e6ec95a91973b0c3c4a92b7ee6f9cd8669b2bfbe2e8890344ec60c22753f2e7,2025-06-05T20:12:23.777000
CVE-2025-5693,0,0,73ee6abfd203da68e2c70f3b21c71009f66bd2babb7c5a3cb5b33a3a3f586bf3,2025-06-05T20:15:27.193000
@ -296644,10 +296647,10 @@ CVE-2025-5695,0,0,063f24d0c2b1152f4531ba63d7cdd6a17fbb245b44cbd467b6e26c69533236
CVE-2025-5696,0,0,0347b4cba043d5ba1e68709292fc67d2e42e886a13ba655971fee5068f4d39bb,2025-06-05T22:15:21.770000
CVE-2025-5697,0,0,65255ba505c3d3bfa33ff57560884cd8e0bdaf4e8acec4cb7c5189e886e27235,2025-06-05T22:15:22.760000
CVE-2025-5698,0,0,3bc6d68f8bac4465e140c6fad804f5cb232019488237f1cd169082769509a350,2025-06-05T22:15:22.963000
CVE-2025-5699,1,1,be5d21dcad32dfe086150ecb00fddb907565548870e00d0bede1b020172e3ca4,2025-06-06T07:15:30.270000
CVE-2025-5699,0,0,be5d21dcad32dfe086150ecb00fddb907565548870e00d0bede1b020172e3ca4,2025-06-06T07:15:30.270000
CVE-2025-5701,0,0,4e463ab950f8de8dad2504c9adb1bf69b81ba722d49ef312bfe8e0759a419475,2025-06-05T20:12:23.777000
CVE-2025-5702,0,0,ee47ef64676a08151d4b3eb2425d567b0db2b91fed39f1554b45738f903b4519,2025-06-05T21:15:22.873000
CVE-2025-5703,1,1,02b101ce8060ed20cc3786565adee8f340de9a049c1fc1ed9223f64bf87b9ff2,2025-06-06T07:15:30.463000
CVE-2025-5703,0,0,02b101ce8060ed20cc3786565adee8f340de9a049c1fc1ed9223f64bf87b9ff2,2025-06-06T07:15:30.463000
CVE-2025-5704,0,0,04beee8a3eb537701c59a3d3797878b13a52af2c4eb1c98a2bf9ef70bf69db6a,2025-06-05T23:15:22.613000
CVE-2025-5705,0,0,0ff358d25cdbb96d1c496b09520f013c9f6b28418dd17b468ae2205989a211b4,2025-06-06T00:15:33.750000
CVE-2025-5706,0,0,69c700685b786445db1c34156db2d8aaab66cbb1389db417b2eef29b7620471b,2025-06-06T01:15:25.233000
@ -296665,11 +296668,18 @@ CVE-2025-5719,0,0,3365d07b7e5244b36ebf3c7bbd556f60e4dbcd5f59cc57d85eb20811268f6c
CVE-2025-5721,0,0,acdc1323104c8cc68eca290c87ee12b78e828ea873146b345ae84261c9b36539,2025-06-06T04:16:00.297000
CVE-2025-5722,0,0,65a4a236210b7d71e031a5f5f15f548284ef2ad5496ba10919780942893e7304,2025-06-06T05:15:25.970000
CVE-2025-5723,0,0,0907f9f8fe7d9c18c43315b01a0ef8041cb166ff8c26b47419c61da0483b148c,2025-06-06T05:15:26.180000
CVE-2025-5724,1,1,49c6ef1293e6731b483955069191bcabd979b75dcc354f6a529ea3c857a17f76,2025-06-06T06:15:31.580000
CVE-2025-5725,1,1,d1122b8979774b4a2e61d076b9f6302dc15071155841a7fb8ba34a15d6aca47c,2025-06-06T06:15:32.100000
CVE-2025-5726,1,1,3abf0ce7ba6937b7c90f700ec89f4d28cc39d472bdb23dbf9b7631fe30198bce,2025-06-06T06:15:32.303000
CVE-2025-5727,1,1,e5e3e497eb82aa63292cdcce97d3dda88ce7a00ba89a5582c82cda30c3334f9d,2025-06-06T07:15:30.657000
CVE-2025-5728,1,1,915cd940e6a694a406d67f11e01a4a8982093111b44ff0d642c0ae837fa934f5,2025-06-06T07:15:30.887000
CVE-2025-5729,1,1,b3363eefc598c66fa7db81b4ea346a67cf3dc12efe772c7327c2c105460d25c7,2025-06-06T07:15:31.133000
CVE-2025-5724,0,0,49c6ef1293e6731b483955069191bcabd979b75dcc354f6a529ea3c857a17f76,2025-06-06T06:15:31.580000
CVE-2025-5725,0,0,d1122b8979774b4a2e61d076b9f6302dc15071155841a7fb8ba34a15d6aca47c,2025-06-06T06:15:32.100000
CVE-2025-5726,0,0,3abf0ce7ba6937b7c90f700ec89f4d28cc39d472bdb23dbf9b7631fe30198bce,2025-06-06T06:15:32.303000
CVE-2025-5727,0,0,e5e3e497eb82aa63292cdcce97d3dda88ce7a00ba89a5582c82cda30c3334f9d,2025-06-06T07:15:30.657000
CVE-2025-5728,0,0,915cd940e6a694a406d67f11e01a4a8982093111b44ff0d642c0ae837fa934f5,2025-06-06T07:15:30.887000
CVE-2025-5729,0,1,bd7a760beb2a8d1e053d5741b77a9e3183e2504c17dfcb7c09ed1261e7aefe0a,2025-06-06T07:15:31.133000
CVE-2025-5732,1,1,1a069a870089cf8690c9d888c11657df4219a3ca4e2a21204de66c54304b65e6,2025-06-06T08:15:21.467000
CVE-2025-5733,0,0,c5f5665f9dab87dd0d97339541a9cd2f4bf8981198cfcb514e8a85cacbcd9a75,2025-06-06T04:16:01.840000
CVE-2025-5734,1,1,6ccbb61ebc10e5830420142f10b0931a14057be87a9027167d4b460b0fd45219,2025-06-06T08:15:21.700000
CVE-2025-5735,1,1,83ee43f8817eb17eca396cda77973ec8a10890c77406881084a9cbdc1284e648,2025-06-06T08:15:21.897000
CVE-2025-5736,1,1,b4be19b74b14bb3b8d67639060bf9f2788ff0d212a501546a4a7607b805b6754,2025-06-06T08:15:22.083000
CVE-2025-5737,1,1,011659aa5539413eb01f9908647f321fea893ae008e41b613b3ecda0737fc1e9,2025-06-06T09:15:23.607000
CVE-2025-5738,1,1,a9fa81223558d6c7fdd3062106d280921058c3276fe354f8ee190924e0c0476c,2025-06-06T09:15:23.860000
CVE-2025-5739,1,1,9a13d06dda721522a0f2627397144f57c2b774ca20bb24f8b1848888d6e4389e,2025-06-06T09:15:24.290000
CVE-2025-5745,0,0,a48c97f3295325ba0b67cceb39fcc754c3ef6872892d5057110c8e62080215c2,2025-06-05T21:15:23.023000

Can't render this file because it is too large.