mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-06-19 17:31:42 +00:00
Auto-Update: 2025-06-08T23:55:18.901420+00:00
This commit is contained in:
parent
593ef8f801
commit
7c1a39696e
145
CVE-2025/CVE-2025-58xx/CVE-2025-5848.json
Normal file
145
CVE-2025/CVE-2025-58xx/CVE-2025-5848.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5848",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-08T22:15:21.200",
|
||||
"lastModified": "2025-06-08T22:15:21.200",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi and classified as critical. Affected by this issue is the function formSetPPTPUserList of the file /goform/setPptpUserList of the component HTTP POST Request Handler. The manipulation of the argument list leads to buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetPPTPUserList-20adf0aa118580d080eacb031b89ddc6",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311594",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311594",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591372",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-58xx/CVE-2025-5849.json
Normal file
145
CVE-2025/CVE-2025-58xx/CVE-2025-5849.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5849",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-08T23:15:20.713",
|
||||
"lastModified": "2025-06-08T23:15:20.713",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been classified as critical. This affects the function formSetSafeWanWebMan of the file /goform/SetRemoteWebCfg of the component HTTP POST Request Handler. The manipulation of the argument remoteIp leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://candle-throne-f75.notion.site/Tenda-AC15-formSetSafeWanWebMan-20adf0aa1185806daab3ebe0036266cb",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311595",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311595",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591375",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-58xx/CVE-2025-5850.json
Normal file
145
CVE-2025/CVE-2025-58xx/CVE-2025-5850.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-5850",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-06-08T23:15:20.927",
|
||||
"lastModified": "2025-06-08T23:15:20.927",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in Tenda AC15 15.03.05.19_multi. It has been declared as critical. This vulnerability affects the function formsetschedled of the file /goform/SetLEDCf of the component HTTP POST Request Handler. The manipulation of the argument Time leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-120"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://candle-throne-f75.notion.site/Tenda-AC15-formsetschedled-20adf0aa118580d984d8fcdb98d9959c",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.311596",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.311596",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.591376",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.tenda.com.cn/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
26
README.md
26
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-06-08T22:00:20.066505+00:00
|
||||
2025-06-08T23:55:18.901420+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-06-08T21:15:33.030000+00:00
|
||||
2025-06-08T23:15:20.927000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,28 +33,16 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
297006
|
||||
297009
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `15`
|
||||
Recently added CVEs: `3`
|
||||
|
||||
- [CVE-2025-32455](CVE-2025/CVE-2025-324xx/CVE-2025-32455.json) (`2025-06-08T21:15:30.993`)
|
||||
- [CVE-2025-32456](CVE-2025/CVE-2025-324xx/CVE-2025-32456.json) (`2025-06-08T21:15:31.267`)
|
||||
- [CVE-2025-32457](CVE-2025/CVE-2025-324xx/CVE-2025-32457.json) (`2025-06-08T21:15:31.403`)
|
||||
- [CVE-2025-32458](CVE-2025/CVE-2025-324xx/CVE-2025-32458.json) (`2025-06-08T21:15:31.537`)
|
||||
- [CVE-2025-32459](CVE-2025/CVE-2025-324xx/CVE-2025-32459.json) (`2025-06-08T21:15:31.673`)
|
||||
- [CVE-2025-3459](CVE-2025/CVE-2025-34xx/CVE-2025-3459.json) (`2025-06-08T21:15:32.770`)
|
||||
- [CVE-2025-3460](CVE-2025/CVE-2025-34xx/CVE-2025-3460.json) (`2025-06-08T21:15:32.900`)
|
||||
- [CVE-2025-3461](CVE-2025/CVE-2025-34xx/CVE-2025-3461.json) (`2025-06-08T21:15:33.030`)
|
||||
- [CVE-2025-35004](CVE-2025/CVE-2025-350xx/CVE-2025-35004.json) (`2025-06-08T21:15:31.807`)
|
||||
- [CVE-2025-35005](CVE-2025/CVE-2025-350xx/CVE-2025-35005.json) (`2025-06-08T21:15:31.947`)
|
||||
- [CVE-2025-35006](CVE-2025/CVE-2025-350xx/CVE-2025-35006.json) (`2025-06-08T21:15:32.087`)
|
||||
- [CVE-2025-35007](CVE-2025/CVE-2025-350xx/CVE-2025-35007.json) (`2025-06-08T21:15:32.227`)
|
||||
- [CVE-2025-35008](CVE-2025/CVE-2025-350xx/CVE-2025-35008.json) (`2025-06-08T21:15:32.363`)
|
||||
- [CVE-2025-35009](CVE-2025/CVE-2025-350xx/CVE-2025-35009.json) (`2025-06-08T21:15:32.500`)
|
||||
- [CVE-2025-35010](CVE-2025/CVE-2025-350xx/CVE-2025-35010.json) (`2025-06-08T21:15:32.633`)
|
||||
- [CVE-2025-5848](CVE-2025/CVE-2025-58xx/CVE-2025-5848.json) (`2025-06-08T22:15:21.200`)
|
||||
- [CVE-2025-5849](CVE-2025/CVE-2025-58xx/CVE-2025-5849.json) (`2025-06-08T23:15:20.713`)
|
||||
- [CVE-2025-5850](CVE-2025/CVE-2025-58xx/CVE-2025-5850.json) (`2025-06-08T23:15:20.927`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
33
_state.csv
33
_state.csv
@ -292432,11 +292432,11 @@ CVE-2025-32444,0,0,288296e03a307a0b00958513c50a8127cb3324308366d3af8facb6f4548c8
|
||||
CVE-2025-32445,0,0,1b5ba881d2838c8e1a17201ae0d99d597a5e3f65b98d8fa06e156c1abb87955d,2025-04-16T13:25:59.640000
|
||||
CVE-2025-3245,0,0,34513d96925346b7609d27ec32e42dfc8926b8b7247f00b351b24b6c6848fab4,2025-04-23T14:51:07.013000
|
||||
CVE-2025-32454,0,0,d112044e8ac2aa2106f1b31f5429f300a7ae216ee8a2c99529918a4b88fc6446,2025-05-13T19:35:18.080000
|
||||
CVE-2025-32455,1,1,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000
|
||||
CVE-2025-32456,1,1,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000
|
||||
CVE-2025-32457,1,1,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000
|
||||
CVE-2025-32458,1,1,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000
|
||||
CVE-2025-32459,1,1,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000
|
||||
CVE-2025-32455,0,0,bbd9ee7abf40b6a9dccd709e5166dd796cbf8871a831e20efc6c94212d75e777,2025-06-08T21:15:30.993000
|
||||
CVE-2025-32456,0,0,d284ee679a768c67f842611d5c59a6768d9c189a7ebe9c37c6e1062e8a06747a,2025-06-08T21:15:31.267000
|
||||
CVE-2025-32457,0,0,910ccefc90cb2d13a730c03221bedc28d87ecb750c712cd54ffa90f1b9a92bd9,2025-06-08T21:15:31.403000
|
||||
CVE-2025-32458,0,0,ed1b705f41f96a6ee909150c688ae38f4b9351f40212178441d1a8c4862086ff,2025-06-08T21:15:31.537000
|
||||
CVE-2025-32459,0,0,aaa4a129c48104f431de5e03da57d6d29997a8f105b3c31e87f984e68da64c95,2025-06-08T21:15:31.673000
|
||||
CVE-2025-3246,0,0,d943818b43557c9519758b844725afa009508b574d2bbdf1c927d75056c761a3,2025-04-21T14:23:45.950000
|
||||
CVE-2025-32460,0,0,16cc364f1c655bf6f21d50384a646311718edc25ee850ac035bf3b1975d34030,2025-04-09T20:02:41.860000
|
||||
CVE-2025-32461,0,0,8bce56f6863b74eaac27069424b18b802ee4aeb8905aa3153fdbbd924c0604dc,2025-04-09T20:02:41.860000
|
||||
@ -293073,9 +293073,9 @@ CVE-2025-3454,0,0,4237309546c7f67c43ed4306317e4be2d74b3a324e1d901b3aa918c9e80660
|
||||
CVE-2025-3455,0,0,27fc2bff0afea6de93406ff695251ef67a3d625051a2b866cd1a3908c7fd4f8e,2025-05-12T17:32:32.760000
|
||||
CVE-2025-3457,0,0,1ce8b706c7f27acea549531081740896317ac6a97554394545c243bd2df931ba,2025-04-30T14:07:52.490000
|
||||
CVE-2025-3458,0,0,f4c08c655e5360e2158789a545b6b552e0aff82df287be3ab4de5c3123f29f32,2025-04-30T14:05:12.373000
|
||||
CVE-2025-3459,1,1,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000
|
||||
CVE-2025-3460,1,1,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000
|
||||
CVE-2025-3461,1,1,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000
|
||||
CVE-2025-3459,0,0,d6c1106b70aa5cfae6feacd38449dbf3a310c9d0ee2b1fe6311c1cbd7996f5ba,2025-06-08T21:15:32.770000
|
||||
CVE-2025-3460,0,0,febf8323410ea68877ee89a7f789617931d3037b404c524b1e2cb91fedf7c836,2025-06-08T21:15:32.900000
|
||||
CVE-2025-3461,0,0,ad004bc388076ed434c1e9184e494c466490c4ca2f3a04538ead681fc0228995,2025-06-08T21:15:33.030000
|
||||
CVE-2025-3462,0,0,96a08229937a9712440a065f7abf8858b2712ba35f45d182986e12e301979bf4,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3463,0,0,b9c293fc915bcaaa130da553f49fb5680a86dfb762948cd4b867acf35ebae4a2,2025-05-12T17:32:52.810000
|
||||
CVE-2025-3468,0,0,136950783d88ce0e5a3cbb5efc9cbb24284feffc83746ee503e38c1107465276,2025-06-04T22:54:54.960000
|
||||
@ -293101,14 +293101,14 @@ CVE-2025-3491,0,0,764070d57369c52ed17db36acb0e46c080442745adab2da0d65d4052df55b4
|
||||
CVE-2025-3495,0,0,fe640c81a3ed6a86c53f35442fa10e181d645418d808dffc6fff69a3880ca71e,2025-04-16T13:25:37.340000
|
||||
CVE-2025-3496,0,0,eeeb25234db4b5411b18647e6b883fd7c97d2c7df03da24267ee3dd146e4a70c,2025-05-12T17:32:32.760000
|
||||
CVE-2025-35003,0,0,21587c625dab7683038a5bdc307498878657bea1128b3a4ea6c83622b9ed0b8f,2025-05-28T15:01:30.720000
|
||||
CVE-2025-35004,1,1,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000
|
||||
CVE-2025-35005,1,1,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000
|
||||
CVE-2025-35006,1,1,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000
|
||||
CVE-2025-35007,1,1,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000
|
||||
CVE-2025-35008,1,1,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000
|
||||
CVE-2025-35009,1,1,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000
|
||||
CVE-2025-35004,0,0,447749e5f1b0eeac431a6fb6856d9e948a7ac885a2abf514f9bcf5b5c8092a98,2025-06-08T21:15:31.807000
|
||||
CVE-2025-35005,0,0,18cf31cde4de8eb18affbeccdc38209c1e192cff1e5424dfafebde7dad73809d,2025-06-08T21:15:31.947000
|
||||
CVE-2025-35006,0,0,ee6d0ae4ce9d090e00224c991975358873b1d3612721159c8066554651ad976c,2025-06-08T21:15:32.087000
|
||||
CVE-2025-35007,0,0,d4d8bee293276b125296b3e9aff03c89dd0f8f7947991715e73320a8b1b09e65,2025-06-08T21:15:32.227000
|
||||
CVE-2025-35008,0,0,353dfbae967aee2dcca1327124a428244cc82b3301fcd256fafcd44fba206bdc,2025-06-08T21:15:32.363000
|
||||
CVE-2025-35009,0,0,df7f9b7486a3b396ddf5855c8f54dc471a364cd8eb32d9dd87f8eec6e2e1608e,2025-06-08T21:15:32.500000
|
||||
CVE-2025-3501,0,0,b44a31b094864acab1ff386cddcad3fda5c65db85ee8c99ed4dbb344cd7aad09,2025-05-02T13:53:40.163000
|
||||
CVE-2025-35010,1,1,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000
|
||||
CVE-2025-35010,0,0,c5b3875219955a1bd44b22a7cb7938ccd85e9e7159a7e4d39174a62544915425,2025-06-08T21:15:32.633000
|
||||
CVE-2025-3502,0,0,7c73723b0d4b00e6da894445c57c5ec7f552a238ff16d874e6183139bc542d93,2025-05-07T16:30:24.910000
|
||||
CVE-2025-3503,0,0,8d73ed34ec38f7a3fa46caf6863bc942845955658d4c73ee2f17e6ea13b905f5,2025-05-07T16:30:33.803000
|
||||
CVE-2025-35036,0,0,8999fc2e6f0f347716ac95ecda1fad4f0e119637eb3d3b6b7486b65b8a53ad62,2025-06-04T14:54:33.783000
|
||||
@ -297005,3 +297005,6 @@ CVE-2025-5838,0,0,ba5038c5e4544342301fefd65f16f3eb1945ebf96b386c6cbebecd735cfedd
|
||||
CVE-2025-5839,0,0,4efb9e7f992ec0cf0b490a41765d64fdc79638a0fc7c7b695bd87786fa84522d,2025-06-07T18:15:25.080000
|
||||
CVE-2025-5840,0,0,6060b28c44367562648dda64a70c474fb07a81415250a659e2cb863608a79fe9,2025-06-07T18:15:25.320000
|
||||
CVE-2025-5847,0,0,c2f0ef1d6191ae5a982ebbcf96b0aeccb9a9e804d684fffe50b5e080d1b4793b,2025-06-08T14:15:21.097000
|
||||
CVE-2025-5848,1,1,b80478a5483b6bb182e91f5c754722b41c29b063497fef165e16b5e242f332fe,2025-06-08T22:15:21.200000
|
||||
CVE-2025-5849,1,1,4bd985a99f1205023a2c3d4c2113f4a18d1aeb5c85ad841e9d9b0bc21074e9f5,2025-06-08T23:15:20.713000
|
||||
CVE-2025-5850,1,1,b6adc1754c863146876fe444ca95e185a637d2b50259ecc472df93f14d69003c,2025-06-08T23:15:20.927000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user