mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-08T22:00:12.613889+00:00
This commit is contained in:
parent
2fb3455c6c
commit
81926446c5
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-1171",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-05-21T23:15:17.897",
|
||||
"lastModified": "2024-11-21T05:09:54.007",
|
||||
"lastModified": "2025-07-08T20:03:48.173",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:python:*:*",
|
||||
"criteria": "cpe:2.3:a:microsoft:python:*:*:*:*:*:visual_studio_code:*:*",
|
||||
"versionEndExcluding": "2020.5.0",
|
||||
"matchCriteriaId": "DC90547C-A7A0-4457-8D2C-625E01393E0F"
|
||||
"matchCriteriaId": "D3F368E6-C263-4F4D-BC61-4C1434C8FB10"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2020-1192",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2020-05-21T23:15:18.837",
|
||||
"lastModified": "2024-11-21T05:09:56.730",
|
||||
"lastModified": "2025-07-08T20:03:48.173",
|
||||
"vulnStatus": "Modified",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -85,9 +85,9 @@
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:microsoft:visual_studio_code:*:*:*:*:*:python:*:*",
|
||||
"criteria": "cpe:2.3:a:microsoft:python:*:*:*:*:*:visual_studio_code:*:*",
|
||||
"versionEndExcluding": "2020.5.0",
|
||||
"matchCriteriaId": "DC90547C-A7A0-4457-8D2C-625E01393E0F"
|
||||
"matchCriteriaId": "D3F368E6-C263-4F4D-BC61-4C1434C8FB10"
|
||||
}
|
||||
]
|
||||
}
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35144",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-25T15:15:07.633",
|
||||
"lastModified": "2025-01-25T15:15:07.633",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:29:44.110",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,44 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.10",
|
||||
"versionEndExcluding": "8.10.14",
|
||||
"matchCriteriaId": "5466CA87-82A9-491D-97E4-C54883A177D5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.11",
|
||||
"versionEndExcluding": "8.11.11",
|
||||
"matchCriteriaId": "8E986BF0-119D-4D6A-AA06-019B5997E8F4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE55E332-8128-4214-8A5B-24F79D95A3FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7174953",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35145",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-25T15:15:08.440",
|
||||
"lastModified": "2025-01-25T15:15:08.440",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:29:30.803",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,30 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE55E332-8128-4214-8A5B-24F79D95A3FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7174956",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35146",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2024-11-06T15:15:19.247",
|
||||
"lastModified": "2024-11-06T18:17:17.287",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:29:54.267",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:8.10.11:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "67179ADA-1D78-4F83-8E78-18AF7FE6A2EC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:8.11.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "189D9AA2-D2BD-4D3D-8860-C920FBDF77ED"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE55E332-8128-4214-8A5B-24F79D95A3FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7174946",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35148",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-25T15:15:08.613",
|
||||
"lastModified": "2025-01-25T15:15:08.613",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:27:05.503",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,40 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:8.10.10:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "864A07E0-4B3D-42C1-8201-8D1F8F06624C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:8.11.7:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "818EC545-251D-4AEE-89AB-BDAC3079A33F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:9.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "FE55E332-8128-4214-8A5B-24F79D95A3FC"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7174952",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-35150",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-01-25T15:15:08.770",
|
||||
"lastModified": "2025-01-25T15:15:08.770",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:22:34.600",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.10.12",
|
||||
"versionEndExcluding": "8.10.15",
|
||||
"matchCriteriaId": "366AC741-3CC0-4DB5-92B5-7C227D40BE74"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "8.11",
|
||||
"versionEndExcluding": "8.11.13",
|
||||
"matchCriteriaId": "DE541EA7-8321-4028-A1D6-99BE62059C88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0.1",
|
||||
"versionEndExcluding": "9.0.5",
|
||||
"matchCriteriaId": "613B6989-AD3C-4259-9B18-E97DD7E9CC32"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:9.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "96E81D05-3954-4D7A-BC81-079EC6D8E715"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7180057",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0158",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-06T21:15:21.923",
|
||||
"lastModified": "2025-02-06T21:15:21.923",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:06:15.347",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "371F5AF5-0001-42F2-9279-ED83FBE2C4C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7182693",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-0759",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-02-27T15:15:40.603",
|
||||
"lastModified": "2025-02-27T15:15:40.603",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:05:43.337",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,47 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "371F5AF5-0001-42F2-9279-ED83FBE2C4C9"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"
|
||||
},
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7184194",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-1500",
|
||||
"sourceIdentifier": "psirt@us.ibm.com",
|
||||
"published": "2025-04-05T01:15:42.000",
|
||||
"lastModified": "2025-04-07T14:17:50.220",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:14:36.577",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -19,7 +19,7 @@
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@us.ibm.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
|
||||
@ -36,6 +36,26 @@
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 3.4
|
||||
},
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.0,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
@ -51,10 +71,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
|
||||
"versionStartIncluding": "9.0",
|
||||
"versionEndExcluding": "9.0.7",
|
||||
"matchCriteriaId": "88645B2B-BFBE-4FF1-9265-91AB4B8F30F2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.ibm.com/support/pages/node/7230140",
|
||||
"source": "psirt@us.ibm.com"
|
||||
"source": "psirt@us.ibm.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-29267",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-07-08T15:15:26.827",
|
||||
"lastModified": "2025-07-08T16:18:14.207",
|
||||
"lastModified": "2025-07-08T21:15:24.580",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "SQL Injection vulnerability in Abis, Inc Adjutant Core Accounting ERP build v.PreBeta250F allows a remote attacker to obtain a sensitive information via the cid parameter in the GET request."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://abis.com",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-31022",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-06-09T16:15:36.610",
|
||||
"lastModified": "2025-06-12T16:06:47.857",
|
||||
"lastModified": "2025-07-08T20:15:25.710",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in PayU India PayU India allows Authentication Abuse. This issue affects PayU India: from n/a through 3.8.5."
|
||||
"value": "Authentication Bypass Using an Alternate Path or Channel vulnerability in PayU PayU India allows Authentication Abuse.This issue affects PayU India: from n/a before 3.8.8."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-37102",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-07-08T19:15:41.753",
|
||||
"lastModified": "2025-07-08T19:15:41.753",
|
||||
"lastModified": "2025-07-08T20:15:25.900",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -35,6 +35,18 @@
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US",
|
||||
|
56
CVE-2025/CVE-2025-371xx/CVE-2025-37103.json
Normal file
56
CVE-2025/CVE-2025-371xx/CVE-2025-37103.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-37103",
|
||||
"sourceIdentifier": "security-alert@hpe.com",
|
||||
"published": "2025-07-08T20:15:26.033",
|
||||
"lastModified": "2025-07-08T20:15:26.033",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Hard-coded login credentials were found in HPE Networking Instant On Access Points, allowing anyone with knowledge of it to bypass normal device authentication. Successful exploitation could allow a remote attacker to gain administrative access to the system."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-alert@hpe.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 9.8,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04894en_us&docLocale=en_US",
|
||||
"source": "security-alert@hpe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-435xx/CVE-2025-43582.json
Normal file
56
CVE-2025/CVE-2025-435xx/CVE-2025-43582.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-43582",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:25.387",
|
||||
"lastModified": "2025-07-08T21:15:25.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Viewer versions 0.22 and earlier are affected by a Heap-based Buffer Overflow vulnerability that could result in arbitrary code execution in the context of the current user, scope unchanged. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-122"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-54.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-435xx/CVE-2025-43583.json
Normal file
56
CVE-2025/CVE-2025-435xx/CVE-2025-43583.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-43583",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:25.543",
|
||||
"lastModified": "2025-07-08T21:15:25.543",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Viewer versions 0.22 and earlier are affected by a NULL Pointer Dereference vulnerability that could lead to application denial-of-service. An attacker could exploit this vulnerability to crash the application, causing disruption in service. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-476"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-54.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-435xx/CVE-2025-43584.json
Normal file
56
CVE-2025/CVE-2025-435xx/CVE-2025-43584.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-43584",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:25.690",
|
||||
"lastModified": "2025-07-08T21:15:25.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Substance3D - Viewer versions 0.22 and earlier are affected by an out-of-bounds read vulnerability that could lead to disclosure of sensitive memory. Exploitation of this issue requires user interaction in that a victim must open a malicious file."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-125"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/substance3d-viewer/apsb25-54.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-47422",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-07-08T14:15:27.997",
|
||||
"lastModified": "2025-07-08T16:18:14.207",
|
||||
"lastModified": "2025-07-08T21:15:25.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,42 @@
|
||||
"value": "Advanced Installer before 22.6 has an uncontrolled search path element local privilege escalation vulnerability. When running as SYSTEM in certain configurations, Advanced Installer looks in standard-user writable locations for non-existent binaries and executes them as SYSTEM. A low-privileged attacker can place a malicious binary in a targeted folder; when the installer is executed, the attacker achieves arbitrary SYSTEM code execution."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-266"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.advancedinstaller.com/advanced-installer-security-fixes-retrospective.html",
|
||||
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48917",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:26.930",
|
||||
"lastModified": "2025-06-16T12:32:18.840",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:35:15.717",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:freelance-it-consultant:eu_cookie_compliance:*:*:*:*:*:drupal:*:*",
|
||||
"versionEndExcluding": "8.x-1.26.0",
|
||||
"matchCriteriaId": "E093DFC2-0DD7-4712-B26B-3DE3A38722E0"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-072",
|
||||
"source": "mlhess@drupal.org"
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48918",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.053",
|
||||
"lastModified": "2025-06-16T12:32:18.840",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:34:54.967",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:klaro:simple_klaro:*:*:*:*:*:drupal:*:*",
|
||||
"versionEndExcluding": "1.10.0",
|
||||
"matchCriteriaId": "A2511FB8-5EEC-44A4-B1D5-F24AE5F030CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-071",
|
||||
"source": "mlhess@drupal.org"
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48919",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.177",
|
||||
"lastModified": "2025-06-16T12:32:18.840",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:35:27.190",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:klaro:simple_klaro:*:*:*:*:*:drupal:*:*",
|
||||
"versionEndExcluding": "1.10.0",
|
||||
"matchCriteriaId": "A2511FB8-5EEC-44A4-B1D5-F24AE5F030CA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-073",
|
||||
"source": "mlhess@drupal.org"
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-48920",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-06-13T16:15:27.293",
|
||||
"lastModified": "2025-06-16T12:32:18.840",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"lastModified": "2025-07-08T20:35:36.687",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:etracker:etracker:*:*:*:*:*:drupal:*:*",
|
||||
"versionEndExcluding": "3.1.0",
|
||||
"matchCriteriaId": "5962448F-F05B-4F5C-A051-958D11C6F1C2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-074",
|
||||
"source": "mlhess@drupal.org"
|
||||
"source": "mlhess@drupal.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49535.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49535.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49535",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.113",
|
||||
"lastModified": "2025-07-08T21:15:26.113",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a Security feature bypass. An attacker could exploit this vulnerability to access sensitive information or denial of service by bypassing security measures. Exploitation of this issue does not require user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:H",
|
||||
"baseScore": 9.3,
|
||||
"baseSeverity": "CRITICAL",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.8
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49536.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49536.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49536",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.280",
|
||||
"lastModified": "2025-07-08T21:15:26.280",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Incorrect Authorization vulnerability that could result in a Security feature bypass. A low-privileged attacker could leverage this vulnerability to bypass security measures and gain unauthorized access. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-863"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49537.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49537.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49537",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.437",
|
||||
"lastModified": "2025-07-08T21:15:26.437",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability that could lead to arbitrary code execution by a high-privileged attacker. Exploitation of this issue requires user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.9,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-78"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49538.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49538.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49538",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.597",
|
||||
"lastModified": "2025-07-08T21:15:26.597",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an XML Injection vulnerability that could lead to arbitrary file system read. An attacker can exploit this issue by injecting crafted XML or XPath queries to access unauthorized files or lead to denial of service. Exploitation of this issue does not require user interaction, and attack must have access to shared secrets."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.2,
|
||||
"impactScore": 5.2
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-91"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49539.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49539.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49539",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.757",
|
||||
"lastModified": "2025-07-08T21:15:26.757",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a security feature bypass. A high-privileged attacker could leverage this vulnerability to access sensitive information. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49540.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49540.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49540",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:26.907",
|
||||
"lastModified": "2025-07-08T21:15:26.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49541.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49541.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49541",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.060",
|
||||
"lastModified": "2025-07-08T21:15:27.060",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49542.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49542.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49542",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.213",
|
||||
"lastModified": "2025-07-08T21:15:27.213",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a reflected Cross-Site Scripting (XSS) vulnerability. If an unauthenticated attacker is able to convince a victim to visit a URL referencing a vulnerable page, malicious JavaScript content may be executed within the context of the victim's browser, scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49543.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49543.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49543",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.360",
|
||||
"lastModified": "2025-07-08T21:15:27.360",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that could be abused by a high-privileged attacker to inject malicious scripts into vulnerable form fields. Malicious JavaScript may be executed in a victim\u2019s browser when they browse to the page containing the vulnerable field, scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49544.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49544.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49544",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.520",
|
||||
"lastModified": "2025-07-08T21:15:27.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Restriction of XML External Entity Reference ('XXE') vulnerability that could result in a Security feature bypass. A high-privileged attacker could leverage this vulnerability to access sensitive information or bypass security measures. Exploitation of this issue does not require user interaction and scope is changed."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-611"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49545.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49545.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49545",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.670",
|
||||
"lastModified": "2025-07-08T21:15:27.670",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Server-Side Request Forgery (SSRF) vulnerability that could lead to arbitrary file system read. A high-privilege authenticated attacker can force the application to make arbitrary requests via injection of URLs. Exploitation of this issue does not require user interaction and scope is changed. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.2,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.7,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-918"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49546.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49546.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49546",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.820",
|
||||
"lastModified": "2025-07-08T21:15:27.820",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by an Improper Access Control vulnerability that could lead to application denial-of-service. A high-privileged attacker could exploit this vulnerability to disrupt the availability of the application. Exploitation of this issue does not require user interaction and scope is unchanged. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
|
||||
"baseScore": 2.4,
|
||||
"baseSeverity": "LOW",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-284"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-495xx/CVE-2025-49551.json
Normal file
56
CVE-2025/CVE-2025-495xx/CVE-2025-49551.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49551",
|
||||
"sourceIdentifier": "psirt@adobe.com",
|
||||
"published": "2025-07-08T21:15:27.970",
|
||||
"lastModified": "2025-07-08T21:15:27.970",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "ColdFusion versions 2025.2, 2023.14, 2021.20 and earlier are affected by a Use of Hard-coded Credentials vulnerability that could result in privilege escalation. An attacker could leverage this vulnerability to gain unauthorized access to sensitive systems or data. Exploitation of this issue does not require user interaction. The vulnerable component is restricted to internal IP addresses."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "ADJACENT_NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@adobe.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-798"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://helpx.adobe.com/security/products/coldfusion/apsb25-69.html",
|
||||
"source": "psirt@adobe.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-533xx/CVE-2025-53355.json
Normal file
64
CVE-2025/CVE-2025-533xx/CVE-2025-53355.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-53355",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-08T20:15:30.020",
|
||||
"lastModified": "2025-07-08T21:15:28.120",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "MCP Server Kubernetes is an MCP Server that can connect to a Kubernetes cluster and manage it. A command injection vulnerability exists in the mcp-server-kubernetes MCP Server. The vulnerability is caused by the unsanitized use of input parameters within a call to child_process.execSync, enabling an attacker to inject arbitrary system commands. Successful exploitation can lead to remote code execution under the server process's privileges. This vulnerability is fixed in 2.5.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Flux159/mcp-server-kubernetes/commit/ab165f5a0eea917fef5dbae954506fff6f4bf514",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Flux159/mcp-server-kubernetes/security/advisories/GHSA-gjv4-ghm7-q58q",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/cyanheads/git-mcp-server/commit/0dbd6995ccdf76ab770b58013034365b2d06c4d9",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,7 +2,7 @@
|
||||
"id": "CVE-2025-53480",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-07-08T15:15:29.720",
|
||||
"lastModified": "2025-07-08T16:18:14.207",
|
||||
"lastModified": "2025-07-08T21:15:28.227",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
@ -11,7 +11,30 @@
|
||||
"value": "The CheckUser extension\u2019s Special:Investigate page has a vulnerability in the Account information tab, where specific internationalized messages are rendered without proper escaping. Attackers can exploit this by appending ?uselang=x-xss to the URL, causing reflected XSS when the UI renders affected message keys.\n\n\n\n\nThis issue affects Mediawiki - CheckUser extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-53495",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-07-07T19:15:23.540",
|
||||
"lastModified": "2025-07-08T18:15:41.607",
|
||||
"lastModified": "2025-07-08T20:15:30.183",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
|
||||
"value": "Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-53496",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-07-07T20:15:27.910",
|
||||
"lastModified": "2025-07-08T16:18:34.923",
|
||||
"lastModified": "2025-07-08T20:15:30.430",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MediaSearch Extension allows Stored XSS.This issue affects Mediawiki - MediaSearch Extension: from 1.39.X before 1.39.13, from 1.43.X before 1.43.2."
|
||||
"value": "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Wikimedia Foundation Mediawiki - MediaSearch Extension allows Stored XSS.This issue affects Mediawiki - MediaSearch Extension: from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-53498",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-07-07T19:15:23.667",
|
||||
"lastModified": "2025-07-08T18:15:41.787",
|
||||
"lastModified": "2025-07-08T21:15:28.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ": Insufficient Logging vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Data Leakage Attacks.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
|
||||
"value": "Insufficient Logging vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Data Leakage Attacks.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-53499",
|
||||
"sourceIdentifier": "c4f26cc8-17ff-4c99-b5e2-38fc1793eacc",
|
||||
"published": "2025-07-07T19:15:23.787",
|
||||
"lastModified": "2025-07-08T18:15:41.973",
|
||||
"lastModified": "2025-07-08T20:15:30.623",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": ": Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.39.X before 1.39.13, from 1.42.X before 1.42.7, from 1.43.X before 1.43.2."
|
||||
"value": "Missing Authorization vulnerability in Wikimedia Foundation Mediawiki - AbuseFilter Extension allows Unauthorized Access.This issue affects Mediawiki - AbuseFilter Extension: from 1.43.X before 1.43.2."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
|
33
CVE-2025/CVE-2025-70xx/CVE-2025-7030.json
Normal file
33
CVE-2025/CVE-2025-70xx/CVE-2025-7030.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-7030",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-07-08T21:15:28.773",
|
||||
"lastModified": "2025-07-08T21:15:28.773",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Privilege Defined With Unsafe Actions vulnerability in Drupal Two-factor Authentication (TFA) allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Two-factor Authentication (TFA): from 0.0.0 before 1.11.0."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-267"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-085",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
33
CVE-2025/CVE-2025-70xx/CVE-2025-7031.json
Normal file
33
CVE-2025/CVE-2025-70xx/CVE-2025-7031.json
Normal file
@ -0,0 +1,33 @@
|
||||
{
|
||||
"id": "CVE-2025-7031",
|
||||
"sourceIdentifier": "mlhess@drupal.org",
|
||||
"published": "2025-07-08T21:15:28.907",
|
||||
"lastModified": "2025-07-08T21:15:28.907",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authentication for Critical Function vulnerability in Drupal Config Pages Viewer allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Config Pages Viewer: from 0.0.0 before 1.0.4."
|
||||
}
|
||||
],
|
||||
"metrics": {},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "mlhess@drupal.org",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-306"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.drupal.org/sa-contrib-2025-086",
|
||||
"source": "mlhess@drupal.org"
|
||||
}
|
||||
]
|
||||
}
|
152
CVE-2025/CVE-2025-71xx/CVE-2025-7192.json
Normal file
152
CVE-2025/CVE-2025-71xx/CVE-2025-7192.json
Normal file
@ -0,0 +1,152 @@
|
||||
{
|
||||
"id": "CVE-2025-7192",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T20:15:30.830",
|
||||
"lastModified": "2025-07-08T20:15:30.830",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [
|
||||
{
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"tags": [
|
||||
"unsupported-when-assigned"
|
||||
]
|
||||
}
|
||||
],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DIR-645 up to 1.05B01 and classified as critical. This issue affects the function ssdpcgi_main of the file /htdocs/cgibin of the component ssdpcgi. The manipulation leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 6.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||||
"baseScore": 6.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "MEDIUM",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-77"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Thir0th/Thir0th-CVE/blob/main/D-Link%20DIR%E2%80%91645%20A1%20has%20a%20remote%20arbitrary%20command%20execution%20vulnerability%20in%20ssdpcgi.md",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315131",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315131",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.607261",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7193.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7193.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7193",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T20:15:31.040",
|
||||
"lastModified": "2025-07-08T20:15:31.040",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in itsourcecode Agri-Trading Online Shopping System up to 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/suppliercontroller.php. The manipulation of the argument supplier leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/Sp1d3rL1/CVE/issues/7",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://itsourcecode.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315132",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315132",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.607303",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7194.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7194.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7194",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T21:15:29.763",
|
||||
"lastModified": "2025-07-08T21:15:29.763",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in D-Link DI-500WF 17.04.10A1T. It has been declared as critical. Affected by this vulnerability is the function sprintf of the file ip_position.asp of the component jhttpd. The manipulation of the argument ip leads to stack-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "HIGH",
|
||||
"vulnIntegrityImpact": "HIGH",
|
||||
"vulnAvailabilityImpact": "HIGH",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||||
"baseScore": 9.0,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "SINGLE",
|
||||
"confidentialityImpact": "COMPLETE",
|
||||
"integrityImpact": "COMPLETE",
|
||||
"availabilityImpact": "COMPLETE"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 8.0,
|
||||
"impactScore": 10.0,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-119"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-121"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/BigMancer/CVE/issues/1",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315133",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315133",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.607311",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.dlink.com/",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
145
CVE-2025/CVE-2025-71xx/CVE-2025-7196.json
Normal file
145
CVE-2025/CVE-2025-71xx/CVE-2025-7196.json
Normal file
@ -0,0 +1,145 @@
|
||||
{
|
||||
"id": "CVE-2025-7196",
|
||||
"sourceIdentifier": "cna@vuldb.com",
|
||||
"published": "2025-07-08T21:15:29.963",
|
||||
"lastModified": "2025-07-08T21:15:29.963",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A vulnerability was found in code-projects Jonnys Liquor 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /browse.php. The manipulation of the argument Search leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 6.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "LOW",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "PROOF_OF_CONCEPT",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
],
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||||
"baseScore": 7.3,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.4
|
||||
}
|
||||
],
|
||||
"cvssMetricV2": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "2.0",
|
||||
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||||
"baseScore": 7.5,
|
||||
"accessVector": "NETWORK",
|
||||
"accessComplexity": "LOW",
|
||||
"authentication": "NONE",
|
||||
"confidentialityImpact": "PARTIAL",
|
||||
"integrityImpact": "PARTIAL",
|
||||
"availabilityImpact": "PARTIAL"
|
||||
},
|
||||
"baseSeverity": "HIGH",
|
||||
"exploitabilityScore": 10.0,
|
||||
"impactScore": 6.4,
|
||||
"acInsufInfo": false,
|
||||
"obtainAllPrivilege": false,
|
||||
"obtainUserPrivilege": false,
|
||||
"obtainOtherPrivilege": false,
|
||||
"userInteractionRequired": false
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cna@vuldb.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-74"
|
||||
},
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-projects.org/",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/Gemileo/CVE/issues/3",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?ctiid.315134",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?id.315134",
|
||||
"source": "cna@vuldb.com"
|
||||
},
|
||||
{
|
||||
"url": "https://vuldb.com/?submit.607468",
|
||||
"source": "cna@vuldb.com"
|
||||
}
|
||||
]
|
||||
}
|
102
README.md
102
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-08T20:00:11.618160+00:00
|
||||
2025-07-08T22:00:12.613889+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-08T19:55:10.697000+00:00
|
||||
2025-07-08T21:15:29.963000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,64 +33,66 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
301080
|
||||
301104
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `20`
|
||||
Recently added CVEs: `24`
|
||||
|
||||
- [CVE-2023-43039](CVE-2023/CVE-2023-430xx/CVE-2023-43039.json) (`2025-07-08T19:15:24.763`)
|
||||
- [CVE-2024-49783](CVE-2024/CVE-2024-497xx/CVE-2024-49783.json) (`2025-07-08T19:15:38.813`)
|
||||
- [CVE-2024-49784](CVE-2024/CVE-2024-497xx/CVE-2024-49784.json) (`2025-07-08T19:15:39.170`)
|
||||
- [CVE-2025-0928](CVE-2025/CVE-2025-09xx/CVE-2025-0928.json) (`2025-07-08T18:15:26.767`)
|
||||
- [CVE-2025-27367](CVE-2025/CVE-2025-273xx/CVE-2025-27367.json) (`2025-07-08T19:15:40.150`)
|
||||
- [CVE-2025-27369](CVE-2025/CVE-2025-273xx/CVE-2025-27369.json) (`2025-07-08T19:15:41.333`)
|
||||
- [CVE-2025-30312](CVE-2025/CVE-2025-303xx/CVE-2025-30312.json) (`2025-07-08T18:15:27.830`)
|
||||
- [CVE-2025-37102](CVE-2025/CVE-2025-371xx/CVE-2025-37102.json) (`2025-07-08T19:15:41.753`)
|
||||
- [CVE-2025-4663](CVE-2025/CVE-2025-46xx/CVE-2025-4663.json) (`2025-07-08T18:15:39.507`)
|
||||
- [CVE-2025-47135](CVE-2025/CVE-2025-471xx/CVE-2025-47135.json) (`2025-07-08T18:15:29.440`)
|
||||
- [CVE-2025-48384](CVE-2025/CVE-2025-483xx/CVE-2025-48384.json) (`2025-07-08T19:15:42.800`)
|
||||
- [CVE-2025-48385](CVE-2025/CVE-2025-483xx/CVE-2025-48385.json) (`2025-07-08T19:15:43.097`)
|
||||
- [CVE-2025-48386](CVE-2025/CVE-2025-483xx/CVE-2025-48386.json) (`2025-07-08T19:15:43.410`)
|
||||
- [CVE-2025-53479](CVE-2025/CVE-2025-534xx/CVE-2025-53479.json) (`2025-07-08T18:15:40.387`)
|
||||
- [CVE-2025-7188](CVE-2025/CVE-2025-71xx/CVE-2025-7188.json) (`2025-07-08T18:15:45.063`)
|
||||
- [CVE-2025-7189](CVE-2025/CVE-2025-71xx/CVE-2025-7189.json) (`2025-07-08T18:15:46.273`)
|
||||
- [CVE-2025-7190](CVE-2025/CVE-2025-71xx/CVE-2025-7190.json) (`2025-07-08T19:15:43.943`)
|
||||
- [CVE-2025-7191](CVE-2025/CVE-2025-71xx/CVE-2025-7191.json) (`2025-07-08T19:15:44.300`)
|
||||
- [CVE-2025-7362](CVE-2025/CVE-2025-73xx/CVE-2025-7362.json) (`2025-07-08T18:15:46.797`)
|
||||
- [CVE-2025-7363](CVE-2025/CVE-2025-73xx/CVE-2025-7363.json) (`2025-07-08T18:15:46.913`)
|
||||
- [CVE-2025-37103](CVE-2025/CVE-2025-371xx/CVE-2025-37103.json) (`2025-07-08T20:15:26.033`)
|
||||
- [CVE-2025-43582](CVE-2025/CVE-2025-435xx/CVE-2025-43582.json) (`2025-07-08T21:15:25.387`)
|
||||
- [CVE-2025-43583](CVE-2025/CVE-2025-435xx/CVE-2025-43583.json) (`2025-07-08T21:15:25.543`)
|
||||
- [CVE-2025-43584](CVE-2025/CVE-2025-435xx/CVE-2025-43584.json) (`2025-07-08T21:15:25.690`)
|
||||
- [CVE-2025-49535](CVE-2025/CVE-2025-495xx/CVE-2025-49535.json) (`2025-07-08T21:15:26.113`)
|
||||
- [CVE-2025-49536](CVE-2025/CVE-2025-495xx/CVE-2025-49536.json) (`2025-07-08T21:15:26.280`)
|
||||
- [CVE-2025-49537](CVE-2025/CVE-2025-495xx/CVE-2025-49537.json) (`2025-07-08T21:15:26.437`)
|
||||
- [CVE-2025-49538](CVE-2025/CVE-2025-495xx/CVE-2025-49538.json) (`2025-07-08T21:15:26.597`)
|
||||
- [CVE-2025-49539](CVE-2025/CVE-2025-495xx/CVE-2025-49539.json) (`2025-07-08T21:15:26.757`)
|
||||
- [CVE-2025-49540](CVE-2025/CVE-2025-495xx/CVE-2025-49540.json) (`2025-07-08T21:15:26.907`)
|
||||
- [CVE-2025-49541](CVE-2025/CVE-2025-495xx/CVE-2025-49541.json) (`2025-07-08T21:15:27.060`)
|
||||
- [CVE-2025-49542](CVE-2025/CVE-2025-495xx/CVE-2025-49542.json) (`2025-07-08T21:15:27.213`)
|
||||
- [CVE-2025-49543](CVE-2025/CVE-2025-495xx/CVE-2025-49543.json) (`2025-07-08T21:15:27.360`)
|
||||
- [CVE-2025-49544](CVE-2025/CVE-2025-495xx/CVE-2025-49544.json) (`2025-07-08T21:15:27.520`)
|
||||
- [CVE-2025-49545](CVE-2025/CVE-2025-495xx/CVE-2025-49545.json) (`2025-07-08T21:15:27.670`)
|
||||
- [CVE-2025-49546](CVE-2025/CVE-2025-495xx/CVE-2025-49546.json) (`2025-07-08T21:15:27.820`)
|
||||
- [CVE-2025-49551](CVE-2025/CVE-2025-495xx/CVE-2025-49551.json) (`2025-07-08T21:15:27.970`)
|
||||
- [CVE-2025-53355](CVE-2025/CVE-2025-533xx/CVE-2025-53355.json) (`2025-07-08T20:15:30.020`)
|
||||
- [CVE-2025-7030](CVE-2025/CVE-2025-70xx/CVE-2025-7030.json) (`2025-07-08T21:15:28.773`)
|
||||
- [CVE-2025-7031](CVE-2025/CVE-2025-70xx/CVE-2025-7031.json) (`2025-07-08T21:15:28.907`)
|
||||
- [CVE-2025-7192](CVE-2025/CVE-2025-71xx/CVE-2025-7192.json) (`2025-07-08T20:15:30.830`)
|
||||
- [CVE-2025-7193](CVE-2025/CVE-2025-71xx/CVE-2025-7193.json) (`2025-07-08T20:15:31.040`)
|
||||
- [CVE-2025-7194](CVE-2025/CVE-2025-71xx/CVE-2025-7194.json) (`2025-07-08T21:15:29.763`)
|
||||
- [CVE-2025-7196](CVE-2025/CVE-2025-71xx/CVE-2025-7196.json) (`2025-07-08T21:15:29.963`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `100`
|
||||
Recently modified CVEs: `23`
|
||||
|
||||
- [CVE-2025-7125](CVE-2025/CVE-2025-71xx/CVE-2025-7125.json) (`2025-07-08T18:29:21.273`)
|
||||
- [CVE-2025-7126](CVE-2025/CVE-2025-71xx/CVE-2025-7126.json) (`2025-07-08T18:29:12.300`)
|
||||
- [CVE-2025-7127](CVE-2025/CVE-2025-71xx/CVE-2025-7127.json) (`2025-07-08T18:29:02.537`)
|
||||
- [CVE-2025-7128](CVE-2025/CVE-2025-71xx/CVE-2025-7128.json) (`2025-07-08T18:28:35.423`)
|
||||
- [CVE-2025-7129](CVE-2025/CVE-2025-71xx/CVE-2025-7129.json) (`2025-07-08T18:28:17.207`)
|
||||
- [CVE-2025-7130](CVE-2025/CVE-2025-71xx/CVE-2025-7130.json) (`2025-07-08T18:28:09.443`)
|
||||
- [CVE-2025-7131](CVE-2025/CVE-2025-71xx/CVE-2025-7131.json) (`2025-07-08T18:28:00.197`)
|
||||
- [CVE-2025-7132](CVE-2025/CVE-2025-71xx/CVE-2025-7132.json) (`2025-07-08T18:15:38.643`)
|
||||
- [CVE-2025-7140](CVE-2025/CVE-2025-71xx/CVE-2025-7140.json) (`2025-07-08T18:15:43.450`)
|
||||
- [CVE-2025-7149](CVE-2025/CVE-2025-71xx/CVE-2025-7149.json) (`2025-07-08T19:18:56.090`)
|
||||
- [CVE-2025-7150](CVE-2025/CVE-2025-71xx/CVE-2025-7150.json) (`2025-07-08T19:18:47.723`)
|
||||
- [CVE-2025-7151](CVE-2025/CVE-2025-71xx/CVE-2025-7151.json) (`2025-07-08T19:18:20.233`)
|
||||
- [CVE-2025-7152](CVE-2025/CVE-2025-71xx/CVE-2025-7152.json) (`2025-07-08T19:13:54.260`)
|
||||
- [CVE-2025-7153](CVE-2025/CVE-2025-71xx/CVE-2025-7153.json) (`2025-07-08T19:07:03.017`)
|
||||
- [CVE-2025-7164](CVE-2025/CVE-2025-71xx/CVE-2025-7164.json) (`2025-07-08T19:19:05.190`)
|
||||
- [CVE-2025-7165](CVE-2025/CVE-2025-71xx/CVE-2025-7165.json) (`2025-07-08T19:19:10.427`)
|
||||
- [CVE-2025-7173](CVE-2025/CVE-2025-71xx/CVE-2025-7173.json) (`2025-07-08T18:15:21.147`)
|
||||
- [CVE-2025-7174](CVE-2025/CVE-2025-71xx/CVE-2025-7174.json) (`2025-07-08T19:19:16.303`)
|
||||
- [CVE-2025-7175](CVE-2025/CVE-2025-71xx/CVE-2025-7175.json) (`2025-07-08T19:19:24.460`)
|
||||
- [CVE-2025-7176](CVE-2025/CVE-2025-71xx/CVE-2025-7176.json) (`2025-07-08T19:19:37.170`)
|
||||
- [CVE-2025-7177](CVE-2025/CVE-2025-71xx/CVE-2025-7177.json) (`2025-07-08T19:19:47.680`)
|
||||
- [CVE-2025-7178](CVE-2025/CVE-2025-71xx/CVE-2025-7178.json) (`2025-07-08T19:37:21.010`)
|
||||
- [CVE-2025-7179](CVE-2025/CVE-2025-71xx/CVE-2025-7179.json) (`2025-07-08T19:37:32.997`)
|
||||
- [CVE-2025-7180](CVE-2025/CVE-2025-71xx/CVE-2025-7180.json) (`2025-07-08T19:41:32.147`)
|
||||
- [CVE-2025-7181](CVE-2025/CVE-2025-71xx/CVE-2025-7181.json) (`2025-07-08T19:40:53.907`)
|
||||
- [CVE-2020-1171](CVE-2020/CVE-2020-11xx/CVE-2020-1171.json) (`2025-07-08T20:03:48.173`)
|
||||
- [CVE-2020-1192](CVE-2020/CVE-2020-11xx/CVE-2020-1192.json) (`2025-07-08T20:03:48.173`)
|
||||
- [CVE-2024-35144](CVE-2024/CVE-2024-351xx/CVE-2024-35144.json) (`2025-07-08T20:29:44.110`)
|
||||
- [CVE-2024-35145](CVE-2024/CVE-2024-351xx/CVE-2024-35145.json) (`2025-07-08T20:29:30.803`)
|
||||
- [CVE-2024-35146](CVE-2024/CVE-2024-351xx/CVE-2024-35146.json) (`2025-07-08T20:29:54.267`)
|
||||
- [CVE-2024-35148](CVE-2024/CVE-2024-351xx/CVE-2024-35148.json) (`2025-07-08T20:27:05.503`)
|
||||
- [CVE-2024-35150](CVE-2024/CVE-2024-351xx/CVE-2024-35150.json) (`2025-07-08T20:22:34.600`)
|
||||
- [CVE-2025-0158](CVE-2025/CVE-2025-01xx/CVE-2025-0158.json) (`2025-07-08T20:06:15.347`)
|
||||
- [CVE-2025-0759](CVE-2025/CVE-2025-07xx/CVE-2025-0759.json) (`2025-07-08T20:05:43.337`)
|
||||
- [CVE-2025-1500](CVE-2025/CVE-2025-15xx/CVE-2025-1500.json) (`2025-07-08T20:14:36.577`)
|
||||
- [CVE-2025-29267](CVE-2025/CVE-2025-292xx/CVE-2025-29267.json) (`2025-07-08T21:15:24.580`)
|
||||
- [CVE-2025-31022](CVE-2025/CVE-2025-310xx/CVE-2025-31022.json) (`2025-07-08T20:15:25.710`)
|
||||
- [CVE-2025-37102](CVE-2025/CVE-2025-371xx/CVE-2025-37102.json) (`2025-07-08T20:15:25.900`)
|
||||
- [CVE-2025-47422](CVE-2025/CVE-2025-474xx/CVE-2025-47422.json) (`2025-07-08T21:15:25.947`)
|
||||
- [CVE-2025-48917](CVE-2025/CVE-2025-489xx/CVE-2025-48917.json) (`2025-07-08T20:35:15.717`)
|
||||
- [CVE-2025-48918](CVE-2025/CVE-2025-489xx/CVE-2025-48918.json) (`2025-07-08T20:34:54.967`)
|
||||
- [CVE-2025-48919](CVE-2025/CVE-2025-489xx/CVE-2025-48919.json) (`2025-07-08T20:35:27.190`)
|
||||
- [CVE-2025-48920](CVE-2025/CVE-2025-489xx/CVE-2025-48920.json) (`2025-07-08T20:35:36.687`)
|
||||
- [CVE-2025-53480](CVE-2025/CVE-2025-534xx/CVE-2025-53480.json) (`2025-07-08T21:15:28.227`)
|
||||
- [CVE-2025-53495](CVE-2025/CVE-2025-534xx/CVE-2025-53495.json) (`2025-07-08T20:15:30.183`)
|
||||
- [CVE-2025-53496](CVE-2025/CVE-2025-534xx/CVE-2025-53496.json) (`2025-07-08T20:15:30.430`)
|
||||
- [CVE-2025-53498](CVE-2025/CVE-2025-534xx/CVE-2025-53498.json) (`2025-07-08T21:15:28.380`)
|
||||
- [CVE-2025-53499](CVE-2025/CVE-2025-534xx/CVE-2025-53499.json) (`2025-07-08T20:15:30.623`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
302
_state.csv
302
_state.csv
@ -111212,7 +111212,7 @@ CVE-2018-1000871,0,0,f213d0703b7dc3893dcef1f05c0a5dc6590d8f3cd0461c35e0540443032
|
||||
CVE-2018-1000872,0,0,b03fac141308fb23c2392ef1ebb701836601cc21440545e63ffae35a356435a2,2024-11-21T03:40:32.810000
|
||||
CVE-2018-1000873,0,0,d1c8b2df778f17f426eaa491de5d8f604caf99d98a5797815da42618185afca5,2024-11-21T03:40:32.963000
|
||||
CVE-2018-1000874,0,0,f88a6241c000aa4374b9f4d5c088b6c592c08a16c432d528a85816df18b3a989,2025-05-06T15:15:52.863000
|
||||
CVE-2018-1000875,0,1,ecd29f5c5d6247803b86c947adc8b09e9423a98c3fb4c0fa8a052efd67cd9948,2025-07-08T18:02:19.117000
|
||||
CVE-2018-1000875,0,0,ecd29f5c5d6247803b86c947adc8b09e9423a98c3fb4c0fa8a052efd67cd9948,2025-07-08T18:02:19.117000
|
||||
CVE-2018-1000876,0,0,eb25e56ce88d30eac164aa65775d93a674968294ec2c620a930312c13befff61,2024-11-21T03:40:33.533000
|
||||
CVE-2018-1000877,0,0,ce3852fad5d3c59a774246c82a2385deed39c57eaada8fa3312260c60b58ee9e,2024-11-21T03:40:33.730000
|
||||
CVE-2018-1000878,0,0,93073c275cffab053bcd383180ede185ea1abc571b464336b922a9ce384b7873,2024-11-21T03:40:33.927000
|
||||
@ -146933,7 +146933,7 @@ CVE-2020-11706,0,0,eeb8b638cf071245d8e93f3342f14ca45f3d2e4a2e7a21ed1fbde0b2d8007
|
||||
CVE-2020-11707,0,0,db51c5eee738c62c43b8709f5d6b70925efb3e350231121ab8f26f9ebc6a1536,2024-11-21T04:58:26.883000
|
||||
CVE-2020-11708,0,0,b5ddea211cc308f025c496f1c9162a7ce419e37388999e4c540d9fccfa3032d5,2024-11-21T04:58:27.020000
|
||||
CVE-2020-11709,0,0,b76b211e9d44f50570ba99ce7aa237753934914dac0fe2eb13fb806b4ae9541b,2024-11-21T04:58:27.163000
|
||||
CVE-2020-1171,0,0,fcb0b24cdccbf70a99cc001f87782f12d7cb899117d6a3e6fd1e03836ea0367d,2024-11-21T05:09:54.007000
|
||||
CVE-2020-1171,0,1,fdd43e2a228e0e6fca9517469132deb9b0fecb159501598222034454996a37f1,2025-07-08T20:03:48.173000
|
||||
CVE-2020-11710,0,0,0c881cb09aeff05a93a0b94dd8ba9913197a5ad156c9209bc4fdded71a2e1e29,2024-11-21T04:58:27.307000
|
||||
CVE-2020-11711,0,0,f4106594acdf7e44ec44e6feabc08da09474b12d7322251671f1a20600de3f46,2024-11-21T04:58:27.460000
|
||||
CVE-2020-11712,0,0,9e2cb49800083b936e9e71815a929f166c3eb08584dd8b1dfaa2e54aada3a68a,2024-11-21T04:58:27.617000
|
||||
@ -147140,7 +147140,7 @@ CVE-2020-11916,0,0,b030395624f14d3ddfb34e8361472323e30df1a28f655a305ea4e251b2e59
|
||||
CVE-2020-11917,0,0,361631f362d68b1327f6ae97965cb78c31dc980e19423c04bf2133098762a588,2025-04-24T13:42:09.087000
|
||||
CVE-2020-11918,0,0,ad61eeacd0c09e2e34ff7eb9fd5948a77d2c6632c01c9683c0aacb298d0c0a33,2025-04-24T13:42:14.090000
|
||||
CVE-2020-11919,0,0,3e028743febf7e998688c904c500f4cadacf5153d3e236d340bfc0008532a36b,2025-04-24T13:42:19.443000
|
||||
CVE-2020-1192,0,0,24850cbc9d9cf9d1258047a4152f3fa8f0b8e40d19399e611eacb0158a5ca382,2024-11-21T05:09:56.730000
|
||||
CVE-2020-1192,0,1,c47824e3f62c77e180aab558e25326b7c33eac983a726e625edb039babafcdb7,2025-07-08T20:03:48.173000
|
||||
CVE-2020-11920,0,0,41a7c64babbfbc6eb1b671f40089d2f0fdd449cd6b55bdbf3f79c9e369f9da41,2024-11-21T04:58:54.423000
|
||||
CVE-2020-11921,0,0,315b667529a9ff7f4c7afe17d5124be593ef5e060992adbd5bb6c18de7ee327d,2024-11-08T19:01:03.880000
|
||||
CVE-2020-11922,0,0,34dee0addcbefd37e031f6dbedb5ad1741ebc2710364aac63adc194527b15f99,2024-11-21T04:58:54.733000
|
||||
@ -173894,7 +173894,7 @@ CVE-2021-28963,0,0,2304b4af33c4d317e39c63a2c8235f0a85228c613000bc96b0c0bb3f126f6
|
||||
CVE-2021-28964,0,0,7eb082b08df9ab93c7a840c3341c5b65f7864d62c1c43719f52651432e5aac20,2024-11-21T06:00:27.570000
|
||||
CVE-2021-28965,0,0,02652b4eb47bdcb10dd33482ec4c510582b31ddd2c01f2c517fe9c030cf7331a,2024-11-21T06:00:27.733000
|
||||
CVE-2021-28966,0,0,1db801b8e028af03874be61e07a1de5f57c0cdf24286fc552b442240e7c0da1f,2024-11-21T06:00:27.910000
|
||||
CVE-2021-28967,0,1,8c78c309741b24815701dc0d65b81bb09a9ca2d8c10256b8c2e99a598d8b9a0e,2025-07-08T18:03:43.277000
|
||||
CVE-2021-28967,0,0,8c78c309741b24815701dc0d65b81bb09a9ca2d8c10256b8c2e99a598d8b9a0e,2025-07-08T18:03:43.277000
|
||||
CVE-2021-28968,0,0,1cd77ca44f907400a448ae737477096dcc607eb48ab638c25dc4a46e165bfb6c,2024-11-21T06:00:28.200000
|
||||
CVE-2021-28969,0,0,748be32984f3fd1bf2988b18e5dba93d1d96fbc40ddba5b94dfa07337d16edca,2024-11-21T06:00:28.340000
|
||||
CVE-2021-28970,0,0,25967119f663bfdc9230a96568afbb43bcd88024dee2cb69cb35ada6ed519e08,2024-11-21T06:00:28.470000
|
||||
@ -235164,8 +235164,8 @@ CVE-2023-43021,0,0,a0bbddf515c7615d7a21424b70d6ff3e77edd9d7b506b2ac8a8c4f0d83536
|
||||
CVE-2023-43029,0,0,b940065720bfec382c597b2a3d50072af4c35eeea4b6c59422fb9e807406e33b,2025-03-21T16:15:17.240000
|
||||
CVE-2023-4303,0,0,93136eac9c8d08898447ae30a75a647fe33081ac4c7707ee720b73a2b46e8947,2024-11-21T08:34:49.317000
|
||||
CVE-2023-43035,0,0,d24f53f7da9f3245556e1ffaec236ac75b88ba5cd9eb8aa2e36d9d78ea04326f,2025-04-11T15:39:52.920000
|
||||
CVE-2023-43037,0,1,b3ea7c9f7cd20c9b28265a1e957e38ecbe5609486d8e778d23dd6e53788c21d3,2025-07-08T18:43:54.423000
|
||||
CVE-2023-43039,1,1,4962c1a5233d2070ecd09dd4236dec0511afbaa6f3b761e89f6393dcc136b18b,2025-07-08T19:15:24.763000
|
||||
CVE-2023-43037,0,0,b3ea7c9f7cd20c9b28265a1e957e38ecbe5609486d8e778d23dd6e53788c21d3,2025-07-08T18:43:54.423000
|
||||
CVE-2023-43039,0,0,4962c1a5233d2070ecd09dd4236dec0511afbaa6f3b761e89f6393dcc136b18b,2025-07-08T19:15:24.763000
|
||||
CVE-2023-4304,0,0,30c442b1ca509db2c352eb32ddfae8a5c91695057d4a24cbb604be68d36d542d,2024-11-21T08:34:49.463000
|
||||
CVE-2023-43040,0,0,937d284b96cf3b48f87e065aff030259d4e51ce2dbf04e32a533b44c969b5fbf,2024-11-21T08:23:38.423000
|
||||
CVE-2023-43041,0,0,d70b52a5cb433935d7c003882d865db4ecf0583966866829a460f3f4084e3f19,2024-11-21T08:23:38.537000
|
||||
@ -240940,7 +240940,7 @@ CVE-2023-51217,0,0,c572e9fc555b67fbd8bd65745c6358aa86fe459a87669ead1694c0f780150
|
||||
CVE-2023-51219,0,0,ed9264b5d5bba3ce65d2752c3b1850f14b4fb39ad5d6f529328c2a51d4c8e38c,2025-02-19T21:15:14.533000
|
||||
CVE-2023-5122,0,0,05cac3257f237d04df2bc4fc8a8899b5106568e4dbd1ff40b3c5537d8f10e59a,2025-02-13T18:15:55.023000
|
||||
CVE-2023-5123,0,0,fbc607d8916f6087859cdc46bf56c313ed6143ddbafacb1cd001f30ba0eeb2fb,2024-11-21T08:41:06.523000
|
||||
CVE-2023-51232,0,1,bd7c12fba63880d0aff5d4f236ca2781510c95bf8c9faefde2fdaf44ce78ca47,2025-07-08T18:15:24.970000
|
||||
CVE-2023-51232,0,0,bd7c12fba63880d0aff5d4f236ca2781510c95bf8c9faefde2fdaf44ce78ca47,2025-07-08T18:15:24.970000
|
||||
CVE-2023-5124,0,0,4ae7f6d72e6f78b906157940196f4187fc84147c90874c38bcd29b0552e85a01,2025-05-22T18:15:31.467000
|
||||
CVE-2023-51246,0,0,960fd793b1477fd8ef0b684daa2469cf1a3748c7b8a6e1e94349f13f7f5a7682,2025-06-16T19:15:25.843000
|
||||
CVE-2023-5125,0,0,6f649fa8f5e8ab758347050d5c13f83daae1107df706ef0b699bd7df9523860b,2024-11-21T08:41:06.760000
|
||||
@ -248870,8 +248870,8 @@ CVE-2024-13333,0,0,1e63cfb04f39a55759c8c89ee7cab85448612ea2c4aaaefe0bce86f3ecb98
|
||||
CVE-2024-13334,0,0,892c3ce546b2f6a66e9e4dfd761dd08aaefb851a17185548e40c2e88d5655747,2025-01-15T04:15:19.720000
|
||||
CVE-2024-13335,0,0,20c8c7696547a710a7247fc1375c3fab2f06247460845b286129a3d00d1d053e,2025-02-05T01:37:46.517000
|
||||
CVE-2024-13336,0,0,0617973929b7ee171ae51423b79a35eb33e0e7b251f4a98140a45686002fe4e1,2025-03-06T15:11:50.350000
|
||||
CVE-2024-13337,0,1,81ea2fa8c3e526c777a1377d0e7cd5c1579faacc7ae1b6f79d7d1fa81de33458,2025-07-08T18:39:46.533000
|
||||
CVE-2024-13338,0,1,9aba2dee1ad911cff42ceace5138c0131cf83d468635913d6c2b7e7f088a5ef6,2025-07-08T18:34:56.977000
|
||||
CVE-2024-13337,0,0,81ea2fa8c3e526c777a1377d0e7cd5c1579faacc7ae1b6f79d7d1fa81de33458,2025-07-08T18:39:46.533000
|
||||
CVE-2024-13338,0,0,9aba2dee1ad911cff42ceace5138c0131cf83d468635913d6c2b7e7f088a5ef6,2025-07-08T18:34:56.977000
|
||||
CVE-2024-13339,0,0,340eea0e2bd475f42d733c8b21f5a4ae0c4c2c22f00aa8474acaaa1473a3f477,2025-02-26T13:36:56.200000
|
||||
CVE-2024-1334,0,0,5cd8113de272a8c461c68981cf2d6addc6166d9cf4d9dbad0d56a2a1ca671349,2024-12-31T16:48:40.290000
|
||||
CVE-2024-13340,0,0,410a07bb948a432c6c68e7813dd264dbb94d6d7c0c36b44969bc437f75da1ae8,2025-01-31T16:02:16.553000
|
||||
@ -252231,7 +252231,7 @@ CVE-2024-22347,0,0,98925c5c5b12b845c533d999ff707c6a1758048410a0cb02f7ddf0f35b213
|
||||
CVE-2024-22348,0,0,73e78bba131c49c7c0de01f5dbc9e904c8c4c7d0e3c30dba954f7148f72cae68,2025-01-20T18:15:13.737000
|
||||
CVE-2024-22349,0,0,83d2f1bc5c4fa6fb8ad422ce8a57cf789473001c88cc2a943bb1acc8aa902911,2025-01-20T18:15:13.930000
|
||||
CVE-2024-2235,0,0,a0829bcbdbed86a72a56dd6769abd8e7854afa08a7fcab0364845431cf5bccbb,2024-11-21T09:09:19.200000
|
||||
CVE-2024-22351,0,1,20f64ec662be6c1399e72201c7d7d12dbf94b8ec55517ff13c117465d8fd5c53,2025-07-08T19:54:58.357000
|
||||
CVE-2024-22351,0,0,20f64ec662be6c1399e72201c7d7d12dbf94b8ec55517ff13c117465d8fd5c53,2025-07-08T19:54:58.357000
|
||||
CVE-2024-22352,0,0,903d5c6f0448bdc0bf08006216f6899a3c5646dd96e9c8f6bb1e8c750ccd821c,2024-11-21T08:56:06.007000
|
||||
CVE-2024-22353,0,0,0ea4428102047b2faffc31e2ac25c47aff142899beade323ab31892621a6fc1f,2024-11-21T08:56:06.147000
|
||||
CVE-2024-22354,0,0,2ec09c69bed145c11f3defa26f0fde40591964402ed095edecd97a1f26625d90,2025-03-06T19:21:14.557000
|
||||
@ -254228,9 +254228,9 @@ CVE-2024-25169,0,0,99447ba0d35007c05de0bb325e4f626f2e771e1210f38989dc4b7d60408a0
|
||||
CVE-2024-2517,0,0,295e66015290670d17656ff58cb1c4da5fc5fa5488e00738c41044e38528f829,2025-02-14T17:00:42.847000
|
||||
CVE-2024-25170,0,0,4c56b2b9fe4a87cb80c5dee02642b875be800d1c7ec89e66c4b2e2df368f00c2,2025-04-28T13:45:09.357000
|
||||
CVE-2024-25175,0,0,d202acf4b9d186a327285b02335009822d657110c4d7975ee8e4ed90ceea8ae1,2024-11-21T09:00:23.977000
|
||||
CVE-2024-25176,0,1,d2e7d692f53f53daabce253dbefe88d296eb0101fc2b291068c4f66a33360a47,2025-07-08T18:15:25.253000
|
||||
CVE-2024-25177,0,1,62119b8763e7a5382d45ea7334875758c6220175454e091235ffe1e64a67f4c2,2025-07-08T18:15:25.520000
|
||||
CVE-2024-25178,0,1,fc8e5af61ac3121f5cc704fa204ab84352492fe85a044fa38036a7d18027a19b,2025-07-08T18:15:25.760000
|
||||
CVE-2024-25176,0,0,d2e7d692f53f53daabce253dbefe88d296eb0101fc2b291068c4f66a33360a47,2025-07-08T18:15:25.253000
|
||||
CVE-2024-25177,0,0,62119b8763e7a5382d45ea7334875758c6220175454e091235ffe1e64a67f4c2,2025-07-08T18:15:25.520000
|
||||
CVE-2024-25178,0,0,fc8e5af61ac3121f5cc704fa204ab84352492fe85a044fa38036a7d18027a19b,2025-07-08T18:15:25.760000
|
||||
CVE-2024-2518,0,0,218e6d38201830e4f08ae52d79ac56db7a7b552c444bda2da7a3568e50b7a7a6,2025-02-14T16:59:49.713000
|
||||
CVE-2024-25180,0,0,6c4f9519ece96564cb8bbb38c56337d15b68729b9ea597b77e43cb8c48c7e78f,2025-05-13T14:46:15.803000
|
||||
CVE-2024-25187,0,0,b5bdcba71ceb1efd4b7f3a75dfc46c9a93b6aa6414ead7bfb505e326018a4574,2025-06-10T00:46:34.737000
|
||||
@ -257418,7 +257418,7 @@ CVE-2024-29211,0,0,0331567c6af8fd83b1e0a24feaf54333b88f51ecbe3f9d759c864c4433a7e
|
||||
CVE-2024-29212,0,0,f963d7fcd137459631aadaac325aaa27dd84dbfdd887563fbdaa9d92aeca5459,2025-06-30T17:53:09.313000
|
||||
CVE-2024-29213,0,0,58a2fe153d8df5cc110824bb7175afc51fd730104e11a4b5eaaeed321d6c4319,2024-10-21T18:35:11.263000
|
||||
CVE-2024-29214,0,0,5f5a5df8a5d35d6ef5821ee15b9cff71b33f2e715308172fd89e9cc7e8f64517,2025-02-12T22:15:32.283000
|
||||
CVE-2024-29215,0,1,ff8c47a36932109bfe958abe3ff28c321b7397983a90f3d94e805402423492f7,2025-07-08T18:02:30.957000
|
||||
CVE-2024-29215,0,0,ff8c47a36932109bfe958abe3ff28c321b7397983a90f3d94e805402423492f7,2025-07-08T18:02:30.957000
|
||||
CVE-2024-29216,0,0,e44e229411bd5856010008f153d4c35e919f7a6598100ee6516223b5fee2cda5,2024-11-21T09:07:50.187000
|
||||
CVE-2024-29217,0,0,0fe660672ed1913811f051df5cadb12ed5b8b5310ae00647eda704d679dfc67c,2025-06-30T13:41:02.870000
|
||||
CVE-2024-29218,0,0,ef19dfac99a5dd1a5c6bfd7879833ef9cd237ef96dffb6007377f3e6e5c4b912,2025-06-30T13:57:35.287000
|
||||
@ -261859,12 +261859,12 @@ CVE-2024-35140,0,0,dcb39679630ddcaef3b6511185b27681ac1153141e804705769f97c9da434
|
||||
CVE-2024-35141,0,0,3e97d4328bde3a3960ec1e8a98391f50d1264f252049e70e215d2b003d7be7ab,2025-01-29T21:00:00.257000
|
||||
CVE-2024-35142,0,0,328375a79823855b00041d487da20dabcff386194ada082c322063fdb5041781,2025-01-27T19:25:19.840000
|
||||
CVE-2024-35143,0,0,5cb5e3449a374a30898ff7b59de5af975c3a54dcd7a31450775ca701ccf638fe,2024-09-11T14:34:13.590000
|
||||
CVE-2024-35144,0,0,9ddeccc265869a9cc76c4a98b857237c4688fac873dafdf1486ff2d283d3c5e2,2025-01-25T15:15:07.633000
|
||||
CVE-2024-35145,0,0,89c4da4ef5d11871e3aa0cc6d5028613dedea73da62ae35483ccf1c794a6123a,2025-01-25T15:15:08.440000
|
||||
CVE-2024-35146,0,0,e9196f1c9e68c1dfc0bdfdf2c184a0205ccb1ae17cf51911c694260acf406ded,2024-11-06T18:17:17.287000
|
||||
CVE-2024-35148,0,0,d43069b1c14736b86c05d2ed0bc1ae22d04dc116b1b2f404909f2a43bd2f580e,2025-01-25T15:15:08.613000
|
||||
CVE-2024-35144,0,1,c7dc46b5e0083cf71157419587f0fa675122b2ed6ca9fe68b7f0237f4449877c,2025-07-08T20:29:44.110000
|
||||
CVE-2024-35145,0,1,edfcda8269262885485f0740f25d7261b38ddcae1efb0399b67f020015a9cf8f,2025-07-08T20:29:30.803000
|
||||
CVE-2024-35146,0,1,00239f993b6e1c35efef1dd7d8607382e63c963b80c88cf209cc8ef6f3f539eb,2025-07-08T20:29:54.267000
|
||||
CVE-2024-35148,0,1,b492ade691ffe1de33410a65849f0e785641a369c7a988d089b22e682d309018,2025-07-08T20:27:05.503000
|
||||
CVE-2024-3515,0,0,34ca6c141b25b76cf038dbaf586f76e7d83b53d44af4d1d927517cbfe224c717,2024-12-19T16:19:23.533000
|
||||
CVE-2024-35150,0,0,4085eabb5234f8cfdb9ea45450ecfaec0d570e14c4c0db51e8dae1f0898e6530,2025-01-25T15:15:08.770000
|
||||
CVE-2024-35150,0,1,fb3c75c51f7ebf1640fd776d1a28947067b13abe6ec9d60dbe8af6b1984a788b,2025-07-08T20:22:34.600000
|
||||
CVE-2024-35151,0,0,997e62f9e09bd79d901a818fa07d83a57b09161e5818037373bd99fb7a3f83e8,2024-08-23T15:32:15.270000
|
||||
CVE-2024-35152,0,0,06c6f92d2caf727cd4e0214816e496c021be32e43d31786397f60659ca719146,2024-08-23T18:57:54.717000
|
||||
CVE-2024-35153,0,0,72b7eff1e351197066dcedfe56c19ee4fca9d867b0c858ba84a516b5786df0b4,2024-11-21T09:19:49.987000
|
||||
@ -263977,9 +263977,9 @@ CVE-2024-37645,0,0,ed1492295339d7a0140a77999293ad86a62381e2bd8a6493345d318dc45c9
|
||||
CVE-2024-37649,0,0,162c02fd634f3857ac43a4b48233920dfa2eaee3a75657af8d68aaa5ded5f644,2024-12-31T20:16:06.253000
|
||||
CVE-2024-3765,0,0,c54b78e5adfc3aa0aeee5a0c713f8fc0d1f32174018a6d7be47506e453bfd25c,2024-11-21T09:30:21.087000
|
||||
CVE-2024-37654,0,0,907897ff6c2382fc56ee5ba07de58991906e2dbb80ef72616776edb5dc93d406,2024-11-21T19:15:08.990000
|
||||
CVE-2024-37656,0,1,33fcb0c2b2bfbb3c09eede1268bc57c05d98f29d188437eb300e2a740e71eb87,2025-07-08T18:15:26.027000
|
||||
CVE-2024-37657,0,1,990477fbf5949034c56bf63d5543ff5a59048e8cffbd6b4e20baecd640dbc854,2025-07-08T18:15:26.270000
|
||||
CVE-2024-37658,0,1,6b7374fc5b74fd647703dbd5ac5288c17f414ec8a28587e793376e23cd6406df,2025-07-08T18:15:26.530000
|
||||
CVE-2024-37656,0,0,33fcb0c2b2bfbb3c09eede1268bc57c05d98f29d188437eb300e2a740e71eb87,2025-07-08T18:15:26.027000
|
||||
CVE-2024-37657,0,0,990477fbf5949034c56bf63d5543ff5a59048e8cffbd6b4e20baecd640dbc854,2025-07-08T18:15:26.270000
|
||||
CVE-2024-37658,0,0,6b7374fc5b74fd647703dbd5ac5288c17f414ec8a28587e793376e23cd6406df,2025-07-08T18:15:26.530000
|
||||
CVE-2024-3766,0,0,5b1f97d45b8d13ab711b52176ff6a759c727cc812c4dd212fe3769d5cd7bfb0f,2024-11-21T09:30:21.280000
|
||||
CVE-2024-37661,0,0,ee08e04759841bbf9e002e732331f80dee9de5ef526cd60e9627ae7db039d225,2025-06-06T17:09:35.177000
|
||||
CVE-2024-37662,0,0,9fb609c29e351aae318bf190d1652757771b4257bef2c46e7c384208ed859872,2025-06-06T17:09:55.507000
|
||||
@ -264521,7 +264521,7 @@ CVE-2024-38310,0,0,6659b53a28a05a037a22232686eb9e98f1c5c7d893b655725e2374a7009bc
|
||||
CVE-2024-38311,0,0,844074ccc615482a832cf120a7aa8a6efa48c65295bdbfe66d71b8371eeea424,2025-04-29T16:34:58.897000
|
||||
CVE-2024-38312,0,0,26321e7daaa7ff032188a33373df43f0cc582c87b09ed7317e18a3e5ab18b300,2025-03-19T15:15:47.450000
|
||||
CVE-2024-38313,0,0,79e2f0eba707bdf51fb8bc87dfd5e2175b7033176980ffe48aa4eab619dc57a9,2025-03-14T16:15:32.797000
|
||||
CVE-2024-38314,0,1,9a2502c2a01d2bb5fef48875fa41fb529543a1828bb0fb750c8278505c313b88,2025-07-08T19:55:10.697000
|
||||
CVE-2024-38314,0,0,9a2502c2a01d2bb5fef48875fa41fb529543a1828bb0fb750c8278505c313b88,2025-07-08T19:55:10.697000
|
||||
CVE-2024-38315,0,0,7f80cda9dd8e03aa7f11a3ebca194914cfdb9ca994dcb1bc1568ef69817f8f68,2024-09-20T14:09:24.733000
|
||||
CVE-2024-38316,0,0,0bcfde6c47906f6331369863083d977ad00f0bf7c55c49c5b3df925033dd1ca3,2025-03-06T21:05:25.850000
|
||||
CVE-2024-38317,0,0,d524f8589f430f01e3a32e6725b29b7a7f6d70199fb0ce93cd3b7d66f2d2c212,2025-03-07T19:41:32.613000
|
||||
@ -273123,8 +273123,8 @@ CVE-2024-4978,0,0,a40a3231ffed7fdeffbb505af558ff22b05804a78c72232543ed223d8f93c3
|
||||
CVE-2024-49780,0,0,94e791324e08cc2b3195181d2e2e02cd06d3c4fade043388ed5d36568cba1fb4,2025-03-11T14:37:00.743000
|
||||
CVE-2024-49781,0,0,7a7c5230f82df168630b4ee346fadce1932798b13bc7966e7f02bdcac534483d,2025-03-11T13:45:47.917000
|
||||
CVE-2024-49782,0,0,6c38878afa4494179b4f6a2e5f560d83948e89acf316688c5d4b4eac5154ba2b,2025-03-11T14:19:11.780000
|
||||
CVE-2024-49783,1,1,f6f14bf02d7cae0bb9458a6c97c0c5aeca2b791f1b28ab3b4b475d22050cd826,2025-07-08T19:15:38.813000
|
||||
CVE-2024-49784,1,1,c0b3432c9c70df2797ef57dd184d9768242f3a6d598aec181da4205b77f71ec0,2025-07-08T19:15:39.170000
|
||||
CVE-2024-49783,0,0,f6f14bf02d7cae0bb9458a6c97c0c5aeca2b791f1b28ab3b4b475d22050cd826,2025-07-08T19:15:38.813000
|
||||
CVE-2024-49784,0,0,c0b3432c9c70df2797ef57dd184d9768242f3a6d598aec181da4205b77f71ec0,2025-07-08T19:15:39.170000
|
||||
CVE-2024-49785,0,0,dcbbdbf2606fdedeb39b6a5ca475a1ee2b528c61106132a119120d628a37dbeb,2025-01-12T02:15:18.973000
|
||||
CVE-2024-49791,0,0,436e3ec68e0463377f56d61753d1a9ed190ae95d7dd892d9e3c8a12bd564a16b,2025-02-12T18:59:58.627000
|
||||
CVE-2024-49792,0,0,a0e4ddf61c9d96412e29678542a33e746e861ad48c587ec37ecef9eff3dcd9cb,2025-02-12T19:00:51.357000
|
||||
@ -282983,7 +282983,7 @@ CVE-2025-0149,0,0,c862a88db319c8eef1ca91fc74c77e313cc2ee14a94c70931d8815bb3a5c42
|
||||
CVE-2025-0150,0,0,dca63b1abf1123a886706c853958072be5044d1c9ef23070ccdaffe267aedd34,2025-03-11T18:15:29.800000
|
||||
CVE-2025-0151,0,0,ee31fb3c9dd590238f179f6f3a56f394ab47d251029c9adfaeba4c64aca0174c,2025-03-11T18:15:29.940000
|
||||
CVE-2025-0154,0,0,50cc7e4c9f2877c13739ab14af2e76b9d150968a2d961bf547c3aad04539fac0,2025-04-07T14:18:49.830000
|
||||
CVE-2025-0158,0,0,4e882d8d791be9a00804f5dabffeb88e4d9fa01bf7c3fbf9a23c37bdc63edff7,2025-02-06T21:15:21.923000
|
||||
CVE-2025-0158,0,1,e7434aebfcc067c6376f6166621f43b287cc7f77944ecab40bdadae87658d09d,2025-07-08T20:06:15.347000
|
||||
CVE-2025-0159,0,0,e878c306d924e00caaf50d08be8d3cef60f47ec75963a54fd0c4c0498de9a2cb,2025-02-28T19:15:36.243000
|
||||
CVE-2025-0160,0,0,d2a1a9a81dbc562cf72d3714c2e19889ce873a845cafc839bb81925c9c9f5573,2025-02-28T19:15:36.393000
|
||||
CVE-2025-0161,0,0,ecccbf64eabc969a96e8026ae7428266ca821c6b81d8fc8ad6251d9383b3dc89,2025-02-20T16:15:36.333000
|
||||
@ -283476,7 +283476,7 @@ CVE-2025-0755,0,0,6d0dbadfda4a802c88ca940e4a533e59c6edc3de28616d86b3c764f16adc71
|
||||
CVE-2025-0756,0,0,2f503184d01f58f956cb3d61accff5238661a48ad3360193623bab7de05b60ea,2025-04-17T20:21:48.243000
|
||||
CVE-2025-0757,0,0,28a402bbfb840751157b78e725c0bb0f7484cb6d9360d77a653a5b5f45018749,2025-04-17T20:21:48.243000
|
||||
CVE-2025-0758,0,0,727f4ea3aa4edd214a32da546eaa17a87b0da516ccecd5a176ebefb6a6f5ee34,2025-04-17T20:21:48.243000
|
||||
CVE-2025-0759,0,0,9ef1e8e8a33e6e49284f23efd0c77699a5a7f7ecffe92488c4bf7d4faf16aefa,2025-02-27T15:15:40.603000
|
||||
CVE-2025-0759,0,1,ebc345f802691100851cf41595f2f2834b96839f1882f416970a0f309a234e40,2025-07-08T20:05:43.337000
|
||||
CVE-2025-0760,0,0,00193022d9afa63eab6ac5d740a3221452c3267e0ba03667c14e8712364e5b04,2025-02-26T00:15:10.890000
|
||||
CVE-2025-0762,0,0,03f57ccaa8cea227bf85d5172a4940cc05d8a50f3c1e62b0d5c2821514db1a51,2025-04-21T20:53:55.553000
|
||||
CVE-2025-0764,0,0,77273f85eebda75df5c1b10c7e10eb8fa4db2d37828ed49e781e9b7366818024,2025-03-06T17:57:14.677000
|
||||
@ -283607,7 +283607,7 @@ CVE-2025-0924,0,0,10ecf80cf443eef5ec891345ba8a8aeeb788757207aa456c03b3fb764739ec
|
||||
CVE-2025-0925,0,0,96e6ae1415f7de21f9d2302b09edfb8f35c8ed2d838c20a02e0bb3cb8fbcd173,2025-02-12T17:15:23.437000
|
||||
CVE-2025-0926,0,0,16fd7a2c3be2d12248638fc71e3dd9aeca4795ef3d713c3c7bfbf5bb8264e3da,2025-04-23T14:08:13.383000
|
||||
CVE-2025-0927,0,0,b46c41d42b89bc6c44b7a8910761be8372f90944775d0b52d65bab4937ea4f2b,2025-04-08T08:15:14.863000
|
||||
CVE-2025-0928,1,1,95eee9a405e1016a6abf4640962425cf881dd4464655343509f2900e3ee2fd6d,2025-07-08T18:15:26.767000
|
||||
CVE-2025-0928,0,0,95eee9a405e1016a6abf4640962425cf881dd4464655343509f2900e3ee2fd6d,2025-07-08T18:15:26.767000
|
||||
CVE-2025-0929,0,0,bcacb82faee52c17b22479d26474b4df04f76f99e634ac515f50cccea0dc9587,2025-01-31T14:15:34.130000
|
||||
CVE-2025-0930,0,0,e48470a5aeaab134703b9f1449e9c6f114cca0e6b49cd331dee21f5acc590fd8,2025-01-31T14:15:34.293000
|
||||
CVE-2025-0934,0,0,435f4840918befd21a2a5141d511b1a79f3fc5ba70f4b6b5d6a0bdf42935fbde,2025-02-18T18:49:12.210000
|
||||
@ -284047,8 +284047,8 @@ CVE-2025-1451,0,0,ec6fe899fd888829fdb360d361245840f88ca8152b7a7e9839ef57ba5f996b
|
||||
CVE-2025-1452,0,0,a12c967518620ecb46c4898ef8820c1d4f840eb8f34fdbae98d063c5d7e9e03f,2025-05-06T19:59:13.060000
|
||||
CVE-2025-1453,0,0,85cdf34ca8e5999b2c75d082b0205888dc9c4a4f149fbeb816361fb8a0e26f97,2025-05-07T19:11:47.723000
|
||||
CVE-2025-1454,0,0,8a29d4ba0be6cb26a700fceeb29a33ed7ddb61c54e346a0e758fc33477c536d3,2025-06-12T16:38:53.070000
|
||||
CVE-2025-1455,0,1,01ef5d069cd8ae11b998370eb142704359a45b04932048f48d2dda03cb51a323,2025-07-08T18:29:14.900000
|
||||
CVE-2025-1456,0,1,a563f8922eda6d6ede9abf723cc81ffaa8877d34dae0901b3ebd786865d5ec92,2025-07-08T18:21:58.743000
|
||||
CVE-2025-1455,0,0,01ef5d069cd8ae11b998370eb142704359a45b04932048f48d2dda03cb51a323,2025-07-08T18:29:14.900000
|
||||
CVE-2025-1456,0,0,a563f8922eda6d6ede9abf723cc81ffaa8877d34dae0901b3ebd786865d5ec92,2025-07-08T18:21:58.743000
|
||||
CVE-2025-1457,0,0,f65c0f703e3b59c2deb97caabf85ed7b86c43fc3b7f6281ae8e2cb0ab0565b82,2025-04-21T14:23:45.950000
|
||||
CVE-2025-1458,0,0,1dedffa997a6cfc08c31c7e1b790604587578a7beeaf8cf479379f185d130761,2025-05-06T14:11:15.670000
|
||||
CVE-2025-1459,0,0,84da8b0d00734a81887e372630f8aae1161cbf72d12203a68a08585146659d7a,2025-03-01T07:15:10.980000
|
||||
@ -284083,7 +284083,7 @@ CVE-2025-1495,0,0,eb77f981cabe4efbe3dd172718fb9875f01d80ca92253d5063810e79b3d445
|
||||
CVE-2025-1496,0,0,00b701fe7bc2e4f39ec7ac2812437dabb31dde7416d14a43308b75ca4d34e495,2025-03-20T14:15:22.920000
|
||||
CVE-2025-1497,0,0,7d02ef7499053e50d8ad89d76099a7d293753bcfe1045929e1a08d34bb3acdae,2025-03-24T18:46:13.367000
|
||||
CVE-2025-1499,0,0,820cdac28fea00c6c66bf92abe2a71a37dbc15ffa52790a34c8e360402089b44,2025-06-09T18:08:54.680000
|
||||
CVE-2025-1500,0,0,96cdab9bc4abd1a8a5aaa4558e15039d03dc56397bf8e0af3d5c9dfed67424a4,2025-04-07T14:17:50.220000
|
||||
CVE-2025-1500,0,1,a57490084db91b200f535477abb76dfd0694b9bddbedb8d302ec142373cfaa34,2025-07-08T20:14:36.577000
|
||||
CVE-2025-1502,0,0,87e6960c6bf75cc8b1380ef7c7e3303ad768ae7a5699ebb71505f60154582a17,2025-03-01T07:15:11.183000
|
||||
CVE-2025-1503,0,0,2ca03eefe6e9ae5c9c7fbf3c0a67f53490f3fa4743fc5d41f8919dbe81c8e9d3,2025-03-13T05:15:24.917000
|
||||
CVE-2025-1504,0,0,0e09d380d5124abfd6e1c49748bbac5d04454a770e81e97825f6db7a4e571c1f,2025-03-24T18:27:10.747000
|
||||
@ -284139,8 +284139,8 @@ CVE-2025-1561,0,0,33a657fb8a4122eef68e03cf0206d7dfa8ce683bdf001162cf574063155213
|
||||
CVE-2025-1562,0,0,9fb2dbef8a74d8da0687b322e75e2fdeed27bae84a466fd912b9479289fa645d,2025-06-18T13:46:52.973000
|
||||
CVE-2025-1564,0,0,9d62e5431da133f133499b29bcb96aa13e41c1b673396891299a0b15aab9c828,2025-03-01T08:15:34.007000
|
||||
CVE-2025-1565,0,0,35456b68df2d2d86ef4d0fb4554495a75d56271b6d28363288295dec6a61577e,2025-04-29T13:52:28.490000
|
||||
CVE-2025-1566,0,1,e8f62a2dc1f21f08dc734f3a7f3dfa9654972dfa82ad59977010fb9cf95e997c,2025-07-08T18:08:30.527000
|
||||
CVE-2025-1568,0,1,669f365c0f91213203573a3a43753856f5e667b656c449a873e372a14d67a731,2025-07-08T18:07:07.210000
|
||||
CVE-2025-1566,0,0,e8f62a2dc1f21f08dc734f3a7f3dfa9654972dfa82ad59977010fb9cf95e997c,2025-07-08T18:08:30.527000
|
||||
CVE-2025-1568,0,0,669f365c0f91213203573a3a43753856f5e667b656c449a873e372a14d67a731,2025-07-08T18:07:07.210000
|
||||
CVE-2025-1569,0,0,c720eea0a639cc15e5f925f105ad985619885e9868957fae072d72faaee5e877,2025-07-05T23:15:24.893000
|
||||
CVE-2025-1570,0,0,e2c8a697fd328cfac1cb14bcdda0501641702037da6bc6d3e9d43d7d6e474d73,2025-03-06T15:35:59.507000
|
||||
CVE-2025-1571,0,0,4a5ce435e807c5b239e456baa952536949a7ac8152f73e9932b99f88f9a0505f,2025-03-07T17:29:48.903000
|
||||
@ -288657,7 +288657,7 @@ CVE-2025-25040,0,0,eef52afdc1e0cd691e9f8e58be6a79eb181268f995aedb195ab63cb8f64ca
|
||||
CVE-2025-25041,0,0,38e8fa4df2cdb6a93ddc945573bdc68d8f211c9cdac3d09670f4b0b980fef07e,2025-04-03T18:15:44.960000
|
||||
CVE-2025-25042,0,0,5f31505452d68a678450274075e145f35ddefef408cd0b3ed1e383cb5d57fac4,2025-03-18T20:15:26.177000
|
||||
CVE-2025-25044,0,0,32cbe5bfdb7c126fdaca206ae5bfc36cf733fd46ea11b87de08f104341ac05bf,2025-06-09T18:08:44.327000
|
||||
CVE-2025-25045,0,1,f207e70c92cc5132acf599c759c4574690ddd5794c201d3a139e1145962af8d3,2025-07-08T19:51:38.223000
|
||||
CVE-2025-25045,0,0,f207e70c92cc5132acf599c759c4574690ddd5794c201d3a139e1145962af8d3,2025-07-08T19:51:38.223000
|
||||
CVE-2025-25046,0,0,ef01fe62076c448c0a74cc0b470d93bb2ae59c519d0a10b5228ec1da6b3dedc6,2025-04-29T13:52:47.470000
|
||||
CVE-2025-2505,0,0,1c5dbc559f463be147cb12740d372dacf2302c45c3ca19193c3edfdb65cecd96,2025-03-20T08:15:11.873000
|
||||
CVE-2025-25050,0,0,80be0a42a493ad295c40d9c183cdd7f4e7bbbd9f1316c32f8687dbafeeaa49e9,2025-06-16T12:32:18.840000
|
||||
@ -289653,7 +289653,7 @@ CVE-2025-26776,0,0,777b3d6f00f90c4800bb30405923ef1b3111a8007fa8cde8f118fda7de44f
|
||||
CVE-2025-26778,0,0,e6495d058014d07c9a16b9a09e04b5b2bc9bd02758320b8fd378f88f985b5aac,2025-02-17T12:15:29.417000
|
||||
CVE-2025-26779,0,0,9024e341253b64921a65d75d7033e8e5a31f095d10dbb69b59e8edd506733722,2025-02-16T23:15:11.630000
|
||||
CVE-2025-2678,0,0,21e043de7d99133c751a03cd3480d87cab1f4c4859861a7ef4f888b9aa8448ca,2025-06-04T15:46:43.063000
|
||||
CVE-2025-26780,0,1,b67a0fb00ea6de8fa0c16327946de4cae6c2484401574f7057e617052dc6fceb,2025-07-08T18:15:27.073000
|
||||
CVE-2025-26780,0,0,b67a0fb00ea6de8fa0c16327946de4cae6c2484401574f7057e617052dc6fceb,2025-07-08T18:15:27.073000
|
||||
CVE-2025-26783,0,0,092d46adf9a3a495bb9ae7bdea70708dc9e2b75c7e54b98486f2b7ae1421fc36,2025-07-01T15:00:29.100000
|
||||
CVE-2025-26784,0,0,9b368b7303cb1dc1907afca1674220ceea8abfeed8648e6f0fe6b5f36f8681c4,2025-06-25T15:11:34.180000
|
||||
CVE-2025-26785,0,0,a61358611e46e9acebc43670ee1699ab15072aa55a4b4f607bd41948bbd8c933,2025-06-25T15:08:42.323000
|
||||
@ -289820,7 +289820,7 @@ CVE-2025-26987,0,0,5d4ef583118fca906f470448340a0a03a4cf3255aa2b717c78243121d64ef
|
||||
CVE-2025-26988,0,0,0319a38815984a3d7757bba2dab0c325e1f38ec9d387be497de99ad33c8d24a9,2025-03-07T20:35:36.553000
|
||||
CVE-2025-26989,0,0,b0ef3d20e454de8c22a4b1527a3da924af34822ec9bc2b6dd3acc50906fd5b9d,2025-03-07T20:36:56.700000
|
||||
CVE-2025-2699,0,0,d65f949bc73c4d7eea85dff141df6ff4da20a0580c32cae2c31e84a6bf8b1e5b,2025-03-24T17:33:00.020000
|
||||
CVE-2025-26990,0,1,afc1fef14852127cc38883bcc8394b88e1f7e95331b9306e39176b67558173b5,2025-07-08T18:20:57.207000
|
||||
CVE-2025-26990,0,0,afc1fef14852127cc38883bcc8394b88e1f7e95331b9306e39176b67558173b5,2025-07-08T18:20:57.207000
|
||||
CVE-2025-26991,0,0,84217b1c95797f5f6a3434460f887fd28027f10e4a2535fce5046994c53e0aac,2025-02-25T15:15:31.460000
|
||||
CVE-2025-26992,0,0,3bcc814450ca7b97d5a912c69e627344323ead8befe4172993a91bdd81fb0273,2025-04-15T18:39:27.967000
|
||||
CVE-2025-26993,0,0,25d916d390de90b80a1e84bf0243f302c32b655919eea97f6f91c9f96aa389dc,2025-02-25T15:15:31.590000
|
||||
@ -289913,7 +289913,7 @@ CVE-2025-27110,0,0,94c21b54338fd64c1140d4cb28fcddebaff47e20a24ceda30c37b569c00a7
|
||||
CVE-2025-27111,0,0,a8db734f919007cb50cb1902fbb4102eb8dcaaff069aa0ece6c61372ee7c3de1,2025-03-04T16:15:40.487000
|
||||
CVE-2025-27112,0,0,8750eafe79b9906895ef1a1c17b5f7972ae9a0f6916d156cfca0a444751c0bd2,2025-02-27T20:24:21.910000
|
||||
CVE-2025-27113,0,0,3f927ac99bedded3f15625d404f90be5185a2dbbeb1f3658f62dd072e77cf603,2025-03-07T01:15:12.823000
|
||||
CVE-2025-2712,0,1,f40fb5320a48b0b52d8a58dd62676768c99c6434d73b292ad23e19fad34166b6,2025-07-08T18:58:17.717000
|
||||
CVE-2025-2712,0,0,f40fb5320a48b0b52d8a58dd62676768c99c6434d73b292ad23e19fad34166b6,2025-07-08T18:58:17.717000
|
||||
CVE-2025-27127,0,0,aa92ecdec22446eb887153af5887b6cb1c8eab8a9fe3105643eee658d265e874,2025-07-08T16:18:14.207000
|
||||
CVE-2025-2713,0,0,96d615228bbe2400210a94715d82e0cb4affc98dd4349c31070f30252b2cc770,2025-03-28T18:11:40.180000
|
||||
CVE-2025-27130,0,0,c40a18d9abfe5d71738f05d240ff807c1b6a6cc630d5ec60a83b043385497b44,2025-07-08T17:09:54.687000
|
||||
@ -290132,8 +290132,8 @@ CVE-2025-27362,0,0,ea009f9b6dd72574d0c931ef6b0637b1702c82a6de7ab17887bff589dd848
|
||||
CVE-2025-27363,0,0,5fc805dcd373aa41b8bfe41b0acc4a7eed4f5eae147e5b3770b01d8700da6b78,2025-05-07T16:00:55.577000
|
||||
CVE-2025-27364,0,0,9286c5546baa0d62309d5b0261f0843f04abf72743b73d703ec5236da175e8e1,2025-02-24T20:15:34.180000
|
||||
CVE-2025-27365,0,0,6d4df35d3031e716958ad58e701388566c342a3c6bf11871692b82631479238a,2025-05-02T13:52:51.693000
|
||||
CVE-2025-27367,1,1,bf22ada9645a21edcb85fa2e5937afecae1a8cf59be73bc29485512c7d7d40ba,2025-07-08T19:15:40.150000
|
||||
CVE-2025-27369,1,1,4e781432a2067a5f28136c724b3d9adc6a647067d0f3bcda4869cdb89dc97a6c,2025-07-08T19:15:41.333000
|
||||
CVE-2025-27367,0,0,bf22ada9645a21edcb85fa2e5937afecae1a8cf59be73bc29485512c7d7d40ba,2025-07-08T19:15:40.150000
|
||||
CVE-2025-27369,0,0,4e781432a2067a5f28136c724b3d9adc6a647067d0f3bcda4869cdb89dc97a6c,2025-07-08T19:15:41.333000
|
||||
CVE-2025-2737,0,0,51a2c6ecf9b15b514f60378f58d17cd54247d487bf2333366f4298c464004222,2025-05-06T19:39:08.970000
|
||||
CVE-2025-27370,0,0,0e4b7966e83d8d55e2eb5b8a991cbcb244993a6e600774bc55d7606305b3dc3b,2025-04-25T15:15:35.820000
|
||||
CVE-2025-27371,0,0,45275223bafac4474512200e04f0e5f05b6e9358eb7647331e7f7cea3c7d0d4c,2025-04-25T15:15:35.937000
|
||||
@ -290170,7 +290170,7 @@ CVE-2025-27416,0,0,7d697ee2a206d2c6a4b9875052c6dbb5339b6641445690f52932a9ae6193d
|
||||
CVE-2025-27417,0,0,369683ced5f62f9d89dc971a092237355749382e0aa840ead6be97cf95036c7d,2025-04-11T19:11:56.647000
|
||||
CVE-2025-27418,0,0,96354a16d0b027d65ae095d929e7d376f87687cc2ec2e4172faf9fb73b2495e9,2025-04-10T18:37:15.777000
|
||||
CVE-2025-27419,0,0,d7b7cf11d35eeb3fa0afbc8e178d471065b3eebc40c5e5d6f63fef0c0db9e934,2025-03-07T20:42:56.750000
|
||||
CVE-2025-2742,0,1,3bcd8d7c349722d2ac3940898995297f87c8bf3e3adab152c14a8c5216428e12,2025-07-08T18:52:44.540000
|
||||
CVE-2025-2742,0,0,3bcd8d7c349722d2ac3940898995297f87c8bf3e3adab152c14a8c5216428e12,2025-07-08T18:52:44.540000
|
||||
CVE-2025-27420,0,0,e26169b2d8aeb36915b37a1f73bbca06f703c84f677f42ba693efe43ee0ed3b3,2025-04-10T18:29:26.170000
|
||||
CVE-2025-27421,0,0,d05fea08a71a3936a2f096f07356bdc55c206f7da4ad4a6502a071cb1952b476,2025-03-03T17:15:15.630000
|
||||
CVE-2025-27422,0,0,cce8795dfe16ac096ec644088df76a3fc7ab0f6058c93abaa8f18c6deb644b95,2025-03-03T17:15:15.787000
|
||||
@ -290181,7 +290181,7 @@ CVE-2025-27426,0,0,9e747dc870c0998abb3ea7b3f3a4eaa73dd29484d0d06dd5ec65096667269
|
||||
CVE-2025-27427,0,0,d565503dda339161e0c992bbf6fbe87052f992922e0285903e51c88162194d98,2025-04-02T22:15:19.083000
|
||||
CVE-2025-27428,0,0,9d4a393ebf9f527eb9f0b93ac4373e3ea15e281d10c2935f997ad96e9026a450,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27429,0,0,e9c8d55b06ff9a31eebf269207964014eaed2a79edaa6a0c360b385b04695c66,2025-04-08T18:13:53.347000
|
||||
CVE-2025-2743,0,1,2890ed8f5f9244a0110edb63a1c5175c8943654e15b71b57f71272dbb6b8aae6,2025-07-08T18:58:27.257000
|
||||
CVE-2025-2743,0,0,2890ed8f5f9244a0110edb63a1c5175c8943654e15b71b57f71272dbb6b8aae6,2025-07-08T18:58:27.257000
|
||||
CVE-2025-27430,0,0,c8635f0b92dae7bf8e99c5e4e8dabb23fa1cb6267b38122c26d97fb0aff537e6,2025-03-11T01:15:36.157000
|
||||
CVE-2025-27431,0,0,85033e3af4b6365958fcf162dc58009a9515212b38e9ac59600dfcd228492344,2025-03-11T01:15:36.310000
|
||||
CVE-2025-27432,0,0,0097aad049d9f686ea71d8a6054e6d326f3e360a2d590fa8120819d74b49d0b1,2025-03-11T01:15:36.467000
|
||||
@ -290199,7 +290199,7 @@ CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501
|
||||
CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27444,0,0,4a47feecb17e273ada092c286d134005100fd80febdd86293ecde589498b8bab,2025-06-09T15:04:33.780000
|
||||
CVE-2025-27445,0,0,b3f5f26acd9b1eeb391c632e6a4f22f7ea880cf9f07dc106f61ff101a1eb24d4,2025-06-17T20:15:31.250000
|
||||
CVE-2025-27446,0,1,fa6337aca36a94ddcf09cc255afec8b54e4de04c5f956cef1aebeb99cdbc1fef,2025-07-08T18:15:27.460000
|
||||
CVE-2025-27446,0,0,fa6337aca36a94ddcf09cc255afec8b54e4de04c5f956cef1aebeb99cdbc1fef,2025-07-08T18:15:27.460000
|
||||
CVE-2025-27447,0,0,ce4ed780b04d23d0b37375dc5564770df1e43bef795462a910832c4a8be33070,2025-07-03T15:13:53.147000
|
||||
CVE-2025-27448,0,0,f5ba7ace9d667bdbf65684150773cbbb69ec990406c133785b5b5234e0e68e7b,2025-07-03T15:13:53.147000
|
||||
CVE-2025-27449,0,0,338c5660364661bf96c6ab3e44992ed998c75364f3c7528d1f424a54c6f530fe,2025-07-03T15:13:53.147000
|
||||
@ -290217,26 +290217,26 @@ CVE-2025-27459,0,0,aa1091d0c8a295ae27a51d52eea99d5c460afe465416601239ba03f53561e
|
||||
CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27460,0,0,c79a01cf9f2b2509358e1771b35f1ce1f991223ce2c74e0f1372f7cc9ce84b0a,2025-07-03T15:13:53.147000
|
||||
CVE-2025-27461,0,0,c6eef03d96c53ca981d95666139fa11f9c3282d5763f38d89f0bad4853d4d6b0,2025-07-03T15:13:53.147000
|
||||
CVE-2025-27467,0,1,38497edee36655f09e756757668053a19ec8d147322f69e4c09ace01b5033893,2025-07-08T18:44:15.350000
|
||||
CVE-2025-27467,0,0,38497edee36655f09e756757668053a19ec8d147322f69e4c09ace01b5033893,2025-07-08T18:44:15.350000
|
||||
CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000
|
||||
CVE-2025-27469,0,1,78d746bef29343d0c3b56d24ead8a421dee3eb42a9191b0679701edbb2715003,2025-07-08T19:06:37.247000
|
||||
CVE-2025-27469,0,0,78d746bef29343d0c3b56d24ead8a421dee3eb42a9191b0679701edbb2715003,2025-07-08T19:06:37.247000
|
||||
CVE-2025-2747,0,0,893662fb5676d31ead9a58cd136c261bd2570bf64bfceca741f28b6354fadd24,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27470,0,1,4df311d0d1b3b26b92ccbfae2a07cb5b09b7cca4cb4e1bcf9d242f5712186ec1,2025-07-08T19:07:08.210000
|
||||
CVE-2025-27471,0,1,eea9b4d978f7b20626d599ae84b6b26a80e035f340fbf8afddf913900aa76854,2025-07-08T19:07:58.847000
|
||||
CVE-2025-27472,0,1,e71a34e254410be9d79dc61195676df26b158cd7f260ee37436eb35d850b8d06,2025-07-08T19:10:12.400000
|
||||
CVE-2025-27473,0,1,e12d67b04e5e4286cd253793fd8be5bc7c92b35d72b3a16f3409fb7f2af26411,2025-07-08T19:10:46.027000
|
||||
CVE-2025-27474,0,1,05492247850e6b15ee904cf68fe82129cc1d12d904999617c06bceab000287d8,2025-07-08T19:11:07.097000
|
||||
CVE-2025-27475,0,1,967b4331a4e98206e3e2a2b4c7330e695ef599828973f218ed49cfc4b4326b24,2025-07-08T19:11:33.150000
|
||||
CVE-2025-27476,0,1,8c110a1482f7c55fe69ffe6b77451070467075c895874e6516f92aaec684f1fd,2025-07-08T19:11:46.750000
|
||||
CVE-2025-27477,0,1,27b4ef6be454a3544ed3839acb4665d925f6be38dc52d15c7cd6bd2e1e902829,2025-07-08T19:12:30.657000
|
||||
CVE-2025-27478,0,1,7781b63aec484d4d38e1cf21eb2ac0affc76261b60cee1587fbeaf7b63f4cb5c,2025-07-08T19:12:54.803000
|
||||
CVE-2025-27479,0,1,bd7be529b7715393a83292c19f43074e9460943cd503438a4882a20240f44017,2025-07-08T19:13:08.073000
|
||||
CVE-2025-27470,0,0,4df311d0d1b3b26b92ccbfae2a07cb5b09b7cca4cb4e1bcf9d242f5712186ec1,2025-07-08T19:07:08.210000
|
||||
CVE-2025-27471,0,0,eea9b4d978f7b20626d599ae84b6b26a80e035f340fbf8afddf913900aa76854,2025-07-08T19:07:58.847000
|
||||
CVE-2025-27472,0,0,e71a34e254410be9d79dc61195676df26b158cd7f260ee37436eb35d850b8d06,2025-07-08T19:10:12.400000
|
||||
CVE-2025-27473,0,0,e12d67b04e5e4286cd253793fd8be5bc7c92b35d72b3a16f3409fb7f2af26411,2025-07-08T19:10:46.027000
|
||||
CVE-2025-27474,0,0,05492247850e6b15ee904cf68fe82129cc1d12d904999617c06bceab000287d8,2025-07-08T19:11:07.097000
|
||||
CVE-2025-27475,0,0,967b4331a4e98206e3e2a2b4c7330e695ef599828973f218ed49cfc4b4326b24,2025-07-08T19:11:33.150000
|
||||
CVE-2025-27476,0,0,8c110a1482f7c55fe69ffe6b77451070467075c895874e6516f92aaec684f1fd,2025-07-08T19:11:46.750000
|
||||
CVE-2025-27477,0,0,27b4ef6be454a3544ed3839acb4665d925f6be38dc52d15c7cd6bd2e1e902829,2025-07-08T19:12:30.657000
|
||||
CVE-2025-27478,0,0,7781b63aec484d4d38e1cf21eb2ac0affc76261b60cee1587fbeaf7b63f4cb5c,2025-07-08T19:12:54.803000
|
||||
CVE-2025-27479,0,0,bd7be529b7715393a83292c19f43074e9460943cd503438a4882a20240f44017,2025-07-08T19:13:08.073000
|
||||
CVE-2025-2748,0,0,ebc7389a6b5f06bc936b869752f476de54bd76de60953f756ced1aea5c0e21b8,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27480,0,1,a06503c80df07239d4258b451adce626363ef3591002ef9a396c0b3c27b62539,2025-07-08T19:13:43.857000
|
||||
CVE-2025-27481,0,1,f3505800dd229402bff2d21ae473ea1e8503b2a162ae52116884df0556e35a99,2025-07-08T19:14:14.253000
|
||||
CVE-2025-27482,0,1,98fe18958432554a2b46ebd3d0290f6d2b834c8414ee6fb93f7582eb0a8ef92c,2025-07-08T19:14:37.617000
|
||||
CVE-2025-27483,0,1,d26c23b83225a54a734cacc4630fbb11dd3e1465381174b8e1ef2abf7a5d1401,2025-07-08T19:14:56.043000
|
||||
CVE-2025-27484,0,1,31be88af46a797a04db96c6fdc9eba015074e8fd5a5bd6fe9bd262ccb77620cb,2025-07-08T19:15:10.173000
|
||||
CVE-2025-27480,0,0,a06503c80df07239d4258b451adce626363ef3591002ef9a396c0b3c27b62539,2025-07-08T19:13:43.857000
|
||||
CVE-2025-27481,0,0,f3505800dd229402bff2d21ae473ea1e8503b2a162ae52116884df0556e35a99,2025-07-08T19:14:14.253000
|
||||
CVE-2025-27482,0,0,98fe18958432554a2b46ebd3d0290f6d2b834c8414ee6fb93f7582eb0a8ef92c,2025-07-08T19:14:37.617000
|
||||
CVE-2025-27483,0,0,d26c23b83225a54a734cacc4630fbb11dd3e1465381174b8e1ef2abf7a5d1401,2025-07-08T19:14:56.043000
|
||||
CVE-2025-27484,0,0,31be88af46a797a04db96c6fdc9eba015074e8fd5a5bd6fe9bd262ccb77620cb,2025-07-08T19:15:10.173000
|
||||
CVE-2025-27485,0,0,0e2f19ec9f4977db1e145c21d35d5f222ede18b212eea6a3f68a8ca928701c4a,2025-07-08T17:14:04.910000
|
||||
CVE-2025-27486,0,0,ad8b07d21ac715bed034b80f6b6f2d22dcf42066be8d771027652c523c75b294,2025-07-08T17:14:17.177000
|
||||
CVE-2025-27487,0,0,80f394c771052098212bf1348a29d97e607cfc5ddd2bb68bbd21da07e4eaff93,2025-07-07T18:25:39.683000
|
||||
@ -291001,7 +291001,7 @@ CVE-2025-2924,0,0,035b342e4739e959d11faebc838ea9c953beab2ad201da68f4190d4779a05c
|
||||
CVE-2025-2925,0,0,6e6057af1505bd2aca9814f533b29610886f80d850b5e22863ae1d8118c6e560,2025-04-17T13:11:07.250000
|
||||
CVE-2025-2926,0,0,ff1a3a2f56ae22a8e0a529aaa06dacf663678ee8cc312c431a50a47697b395d6,2025-04-17T14:31:21.250000
|
||||
CVE-2025-29266,0,0,ebe0e382c4a5abdfbad4d36c3a40b9356ea4b38f02b497fb84326608368d7b76,2025-04-01T20:26:30.593000
|
||||
CVE-2025-29267,0,0,cce991a10929a94ff331562f4bbcb7024fcae01d91733e59119c638db9881007,2025-07-08T16:18:14.207000
|
||||
CVE-2025-29267,0,1,abe653f4228073d944ad06d9561e97335968bb8e4e633bcb2a8d23869a1e2b07,2025-07-08T21:15:24.580000
|
||||
CVE-2025-2927,0,0,7f5ccbf74e8614d1ffa159b8af7772e0f2741b8003c2ff25a8317d72824fcb99,2025-04-14T17:09:19.427000
|
||||
CVE-2025-29280,0,0,e7078c1a79e321c5221787040b502a3130fd227c8ba1ab7d76f6b02d2b9646b4,2025-06-24T15:19:45.883000
|
||||
CVE-2025-29281,0,0,2c8d5f95d208357f48baeea9b566a4a0d55fc700bf49c9e1592597f8c42930b8,2025-06-24T15:17:53.360000
|
||||
@ -291543,7 +291543,7 @@ CVE-2025-30308,0,0,c92d8023b3a04eb715f8eaa1b903bb6a800ec17c7c85ef2c351a7bd124c4f
|
||||
CVE-2025-30309,0,0,9f9cf0cdd20ae1c66398c9aa3e331adc1c37648db304a8a0df1f73479945006c,2025-04-22T20:59:52.953000
|
||||
CVE-2025-3031,0,0,5d60434c3fd1b9eb0ecabc1c274e22b04626361f427f9c196b8950f8f03f9539,2025-04-07T13:31:10.027000
|
||||
CVE-2025-30310,0,0,664c5c0917b994456cf8cf1770f4e26dab72570ca49aebcf3803f0c4478c2c37,2025-05-14T14:28:01.833000
|
||||
CVE-2025-30312,1,1,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000
|
||||
CVE-2025-30312,0,0,d8970b1c2c24348ac512ef795bb871415a9b852028c471c93ceff988db0fee4b,2025-07-08T18:15:27.830000
|
||||
CVE-2025-30314,0,0,64cf02f0bc690481a57c6cdb14a994551761ffa2e82058946039130616e9602c,2025-05-19T20:29:21.407000
|
||||
CVE-2025-30315,0,0,db0eda92c59831715273a267152e238fac9691a936628e374e847ef4f8e7639b,2025-05-19T20:29:33.717000
|
||||
CVE-2025-30316,0,0,7c60bffaf5b5500cead0b668c260c53f7df6586ed76525d0085392b74ef9c702,2025-05-19T20:29:48.503000
|
||||
@ -292202,7 +292202,7 @@ CVE-2025-31019,0,0,0ce2758b0a8e888aab73b46b8932e361c63f6d92aba8710ee3abf24f3437a
|
||||
CVE-2025-3102,0,0,9c4ff38556bcdb14ac2775e48a2e31e8e52dc53cbe7c5d18a0dcd91a18882777,2025-04-11T15:40:10.277000
|
||||
CVE-2025-31020,0,0,7e2e00eca59f243d0beec980806f16099342ab07866da05064b3c4742d7e81ef,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31021,0,0,5e198c1f2cf0cbdc7790475dda4dcc0a1f65322a9e0fb3a2fc32c0ec4cdae5d7,2025-04-11T15:39:52.920000
|
||||
CVE-2025-31022,0,0,0b10187bcfed5a388af3712dc48aa9adb1eebc35963f0eb5060e8170bdd0a0c3,2025-06-12T16:06:47.857000
|
||||
CVE-2025-31022,0,1,3c26be2f841180e64a7edbab84a4dd7945f0b1186e4aceb174656c95f2ffab58,2025-07-08T20:15:25.710000
|
||||
CVE-2025-31023,0,0,b2b6dfb4fff9d3759d0e8242dd466693eb363f1c7ae0a1b9a5f68a061dc5a13e,2025-04-09T20:02:41.860000
|
||||
CVE-2025-31024,0,0,f13bb7564e2d955fe9c74ce3d5d82196ceac98ae0a3fb4b1ae7d33aec0a3a8af,2025-04-01T20:26:11.547000
|
||||
CVE-2025-31025,0,0,053527fbe27001f119a974095c520ba6e0ed6e07579def4bdb1aa3af4361283c,2025-06-06T14:06:58.193000
|
||||
@ -293402,7 +293402,7 @@ CVE-2025-32464,0,0,d585900889b901117e0fe728cc5e64b12123c28db643e71ecaab58b676037
|
||||
CVE-2025-32465,0,0,18f0254fcddc6f93884de750d3f2429ec4adc6fe5d4e9076904035e514a09681,2025-06-12T16:06:20.180000
|
||||
CVE-2025-32466,0,0,d6dc52d19056c6857b8d7b1ad7b39f71f723d971a207e33753f74fea4bed0bab,2025-06-12T16:06:20.180000
|
||||
CVE-2025-32469,0,0,034a2ddf5f9dec53009cbb127017ccf63c0f90ca0f769a7360e958242bda1374,2025-05-13T19:35:18.080000
|
||||
CVE-2025-3247,0,1,04dd301a9c8698b2a6576a9d10ca92572b0a86ae5f3fb29a1a733c68d0b61a1e,2025-07-08T18:13:23.407000
|
||||
CVE-2025-3247,0,0,04dd301a9c8698b2a6576a9d10ca92572b0a86ae5f3fb29a1a733c68d0b61a1e,2025-07-08T18:13:23.407000
|
||||
CVE-2025-32470,0,0,a499a2b3ade62ca8ae1204ce8b8951199f2d815b04c9e384ee8d957c3a85610b,2025-04-29T13:52:10.697000
|
||||
CVE-2025-32471,0,0,e4e68df56fdc28d70b2413943a11a5a53e926269827bac3999d8401d390437e5,2025-04-29T13:52:10.697000
|
||||
CVE-2025-32472,0,0,85ee653f9e548e95fb4dd50bc63e10fde5769b5be5851a74bb5cc310b58bc9d3,2025-04-29T13:52:10.697000
|
||||
@ -293742,7 +293742,7 @@ CVE-2025-32816,0,0,7146ab229fea4de6245a9faadeb60513e017f27b734755baaf195d3f55011
|
||||
CVE-2025-32817,0,0,8b6f04caa830a0ea93810ab4c8eba574bc1867ee17bc40202e1fbd1543823077,2025-04-17T20:21:48.243000
|
||||
CVE-2025-32818,0,0,5e54d238f6a350e89e91e1728be0dc339348ac2a1d2e8bfcf1b4dfe58cd7bcde,2025-04-29T13:52:47.470000
|
||||
CVE-2025-32819,0,0,f17ef2947dde39f79f526623b8c14e02cd77ed6b2e2cf97bc0f185c6999c328f,2025-05-19T15:13:46.003000
|
||||
CVE-2025-3282,0,1,82d6be97ae9febbb29788d8e262d8e9703b2ff98ab343cdafad5fc2e0f72ecc2,2025-07-08T18:32:17.517000
|
||||
CVE-2025-3282,0,0,82d6be97ae9febbb29788d8e262d8e9703b2ff98ab343cdafad5fc2e0f72ecc2,2025-07-08T18:32:17.517000
|
||||
CVE-2025-32820,0,0,32229bbbb058859c6bce3baf0ddfc4bf0031736588fbc85e60d8c3c49a4eccb1,2025-05-19T15:12:48.930000
|
||||
CVE-2025-32821,0,0,1f2a97fbb0024b27f601c714cf8c5df7968c694d023b0428675ee8d2e07438b1,2025-05-19T15:12:23.690000
|
||||
CVE-2025-32822,0,0,464424b18ac6c32d012890b6af75f32fb9d96551fc47be6e498e8c2c0b89e67d,2025-04-17T20:21:48.243000
|
||||
@ -293834,7 +293834,7 @@ CVE-2025-32914,0,0,3af3067d70bd81f91455998b87224657ddcf7d162a47d749db58a95e60683
|
||||
CVE-2025-32915,0,0,2d5afa660948b242629afd805b42088f6d76764cd20288c422f89dd9fe02bb30,2025-05-23T15:55:02.040000
|
||||
CVE-2025-32917,0,0,621a83e4e955a5402f378188c4f01b4aff8a0585cec439fee69248f2294167f0,2025-05-13T19:35:18.080000
|
||||
CVE-2025-32918,0,0,6fd595c92d95f19cda725ce2363e0c48caa34121f666935f92293e3e5bcdf8bf,2025-07-08T16:18:53.607000
|
||||
CVE-2025-3292,0,1,891f6cddd840ec8b1eb9b92a0d84e7baf67380c23d97f00e4c7127d09386ae59,2025-07-08T18:31:04.310000
|
||||
CVE-2025-3292,0,0,891f6cddd840ec8b1eb9b92a0d84e7baf67380c23d97f00e4c7127d09386ae59,2025-07-08T18:31:04.310000
|
||||
CVE-2025-32920,0,0,7e212ccae54e7de68d6b49d615b9e74e6cf3cb23588850cf6230b262d708bae7,2025-06-17T10:15:22.177000
|
||||
CVE-2025-32921,0,0,7c798e84a120c09e79aa61f0d66dd4a5e84ea134e24a6f6fea02a374ca1d5b0e,2025-04-29T13:52:47.470000
|
||||
CVE-2025-32922,0,0,dd2fa7743096c0ae961ecc41cbe765ffa285523c06483f9df72c6611b9ab1dab,2025-05-16T14:43:26.160000
|
||||
@ -294464,7 +294464,8 @@ CVE-2025-37099,0,0,067e991498d8cba31dd0ba2256a8ecf23acb321ae5ac75f861fdab474706e
|
||||
CVE-2025-3710,0,0,0a7778bd78e4f22f022c252525488d49274bac6d5b6fae8773984217c6dc6eab,2025-05-28T03:15:21.150000
|
||||
CVE-2025-37100,0,0,88b9ad7c7695f3a4670adb22647dcc8cbf099c03d5439646676dc63333e683a5,2025-06-12T16:06:39.330000
|
||||
CVE-2025-37101,0,0,611db152f3bf6fbbe88c02a9c7c1f7f719963d9f48f127e010121dc26484aa06,2025-06-26T18:57:43.670000
|
||||
CVE-2025-37102,1,1,6193b8be353d8a9087a3664efc506a1a42b3594c48e9ab453aa8242b24d78375,2025-07-08T19:15:41.753000
|
||||
CVE-2025-37102,0,1,e957a98e57ec2a00ca989b07ab7fbd13a25eb1be41e0259645c0dc9244705a8b,2025-07-08T20:15:25.900000
|
||||
CVE-2025-37103,1,1,364730b69dc7866b08468b37b922a50992e97360b0853a65e19fa530811f5be5,2025-07-08T20:15:26.033000
|
||||
CVE-2025-3711,0,0,4fd34b3efb29d679fc862ba489bdc27881bacd2c43f3c49bf4be0e93fc622083,2025-05-28T03:15:22.193000
|
||||
CVE-2025-3712,0,0,ea56365e47ceb44e31dafb8f72bb0d4f1a8a74a514b3fc339176f713c23eafa1,2025-05-28T03:15:22.310000
|
||||
CVE-2025-3713,0,0,7e67304534c06f2079db65e532178b0781d2814a48010fdc27d2a08fd7f43f29,2025-05-28T03:15:22.430000
|
||||
@ -295728,7 +295729,7 @@ CVE-2025-41255,0,0,32ed652e78f1b50c30737507672b44a5804935019958dd77944563d6a216e
|
||||
CVE-2025-41256,0,0,cedb6f0c088b2c2fff6de32054121c264c1356c72e5a09444dc9d179ee8d5242,2025-06-26T18:57:43.670000
|
||||
CVE-2025-4126,0,0,c504eb8f9e35e66ea3a2e9e649e0b3ff59910e9bf49695680cf85ff18119f2ac,2025-05-16T14:43:26.160000
|
||||
CVE-2025-4127,0,0,440aeef33b0470c9ce2f9d93f454f227b230a85f1c418afc74834471a41511d6,2025-06-04T22:46:00.467000
|
||||
CVE-2025-4128,0,1,cf241d07c428b5d7dabcd1e77934f6696ad5b58aaf071bafa82763b8cf5a30bc,2025-07-08T19:42:06.743000
|
||||
CVE-2025-4128,0,0,cf241d07c428b5d7dabcd1e77934f6696ad5b58aaf071bafa82763b8cf5a30bc,2025-07-08T19:42:06.743000
|
||||
CVE-2025-4131,0,0,e145db9bdcf5e54a3788ea8919212b2cfcdb96e29e639a2a6fca852d8fbe36f2,2025-05-02T13:52:51.693000
|
||||
CVE-2025-4132,0,0,e4809de586f057a9e14a37c05676b7015f221bfc82c94512bf23f0611070b256,2025-05-12T09:15:16.080000
|
||||
CVE-2025-4133,0,0,62707a46d404303184816916a5f626e6709dc33fc51eeac3cd7609c2da4dc930,2025-06-09T20:13:53.007000
|
||||
@ -296098,6 +296099,9 @@ CVE-2025-43579,0,0,7eef94019923cdf7523c797919be9d42cfebb3f84c4aac09a8b6180f71a5f
|
||||
CVE-2025-4358,0,0,d3722602427908cbcfc83920c5bb8690b3edbc0005f687a90c096634472fae17,2025-05-15T07:15:50.917000
|
||||
CVE-2025-43580,0,0,296c99ebc23f32f4dd18a945cf6ad3e76fcf085e153a660b50b07de56bba031a,2025-07-08T17:15:35.940000
|
||||
CVE-2025-43581,0,0,be2c63dd2c1987721d4f59f8519c99d785cb988dc2b859928d2cddedf0fc15f2,2025-06-12T16:06:29.520000
|
||||
CVE-2025-43582,1,1,0fcb5be1fc5bfa88b29818894fe3f529f2ee3c6b91f295fe34d80d4997bfe8e2,2025-07-08T21:15:25.387000
|
||||
CVE-2025-43583,1,1,76b6d2c2d6bee66ce37350a2770772b1b6e1d8c5d198df6224bd73bfc02148f2,2025-07-08T21:15:25.543000
|
||||
CVE-2025-43584,1,1,a0c8e034915966694605906dbd858c64675bcbe4ecadf29fb3d8e7c6ec4c7468,2025-07-08T21:15:25.690000
|
||||
CVE-2025-43585,0,0,6df4e3a17a9131e321c50e0e04cd2c0725f7cea66af401580d79eb104580f09e,2025-06-23T19:22:41.517000
|
||||
CVE-2025-43586,0,0,bf57beb4510c3c1c98308dc5ea38415d9786647d178b76150399e4110e62a6d4,2025-06-23T19:22:26.633000
|
||||
CVE-2025-43587,0,0,4594025616f20b82c6b239fc92b3effb5293c92268387236cfe5ca3122042a7c,2025-07-08T17:15:36.137000
|
||||
@ -296211,10 +296215,10 @@ CVE-2025-43925,0,0,5cbb409f553038693387337b241da0f0142b19c7ebb79197568d829b038e5
|
||||
CVE-2025-43926,0,0,4d0844f61e8a4f3908e6525284978ee3dd3d8da4c86df34256626c5eb8824ebd,2025-06-12T16:44:04.490000
|
||||
CVE-2025-43928,0,0,ada37df9b018408af843f1b1cc9151f6f5a494aafca776d997eba7b7d4788264,2025-04-24T16:00:50.257000
|
||||
CVE-2025-43929,0,0,867435a167581ab99f3a2b85e0ea6073e3538639a37e0ae43a9f94228cfe9a85,2025-04-24T15:46:35.757000
|
||||
CVE-2025-43930,0,1,4b1a19d5ef268014b963a4fb7210f417d521ce7f36f92cb33128a241c159e2a5,2025-07-08T18:15:28.043000
|
||||
CVE-2025-43931,0,1,ecccdc9469691ea4cad6c639a9917fa3e9a32bfa39b422e2a2011939f9e39415,2025-07-08T18:15:28.290000
|
||||
CVE-2025-43932,0,1,f27f9eec0d1598e5348e4bc8d429ab81fac2e73900681341dccc195fdc13bb06,2025-07-08T18:15:28.527000
|
||||
CVE-2025-43933,0,1,2791a7a35866c0d1daf8e9e87f956d5595cb9954b7496c8f440f6863df961a62,2025-07-08T18:15:28.750000
|
||||
CVE-2025-43930,0,0,4b1a19d5ef268014b963a4fb7210f417d521ce7f36f92cb33128a241c159e2a5,2025-07-08T18:15:28.043000
|
||||
CVE-2025-43931,0,0,ecccdc9469691ea4cad6c639a9917fa3e9a32bfa39b422e2a2011939f9e39415,2025-07-08T18:15:28.290000
|
||||
CVE-2025-43932,0,0,f27f9eec0d1598e5348e4bc8d429ab81fac2e73900681341dccc195fdc13bb06,2025-07-08T18:15:28.527000
|
||||
CVE-2025-43933,0,0,2791a7a35866c0d1daf8e9e87f956d5595cb9954b7496c8f440f6863df961a62,2025-07-08T18:15:28.750000
|
||||
CVE-2025-43946,0,0,c567cb496d37f6e22b9596b552a09de1b07a7e7e527c7608b3f0bd1ce8e16534,2025-06-23T18:03:44.927000
|
||||
CVE-2025-43947,0,0,a218c15b83c9a2c09ba597126a826cdb3cf5018f77547d94f85a505842a307eb,2025-06-23T17:59:17.940000
|
||||
CVE-2025-43948,0,0,efd3931cdaeca2d3b1dbf5f3f44aee732afa37b700ca8822c69f897fc0f80984,2025-04-23T14:08:13.383000
|
||||
@ -296443,7 +296447,7 @@ CVE-2025-45042,0,0,e22830cb7bf04c3c2d82e6baefcc0ab2bba0906b03ab3d09def3ca7404c47
|
||||
CVE-2025-4505,0,0,1d5d8bdff5bba4724931179b40e9fa7b3a85ddcafb19b02c09ec15b5af8bbb67,2025-05-16T13:36:25.113000
|
||||
CVE-2025-45055,0,0,e5d1642005209a692bee6ae7046330e80677a4e4d42d7e617bd6fdcd6cd60a44,2025-06-25T20:24:56.750000
|
||||
CVE-2025-4506,0,0,3568a707dd9c5fac6d63b0c6b8838d459b084b79c1362aa32745d2610deb51f5,2025-05-13T18:57:05.830000
|
||||
CVE-2025-45065,0,1,6015c15d00bc97b726456bfadabd56a66b883f157da6ee106cbe61c29114b965,2025-07-08T18:15:28.967000
|
||||
CVE-2025-45065,0,0,6015c15d00bc97b726456bfadabd56a66b883f157da6ee106cbe61c29114b965,2025-07-08T18:15:28.967000
|
||||
CVE-2025-4507,0,0,33f4384ad7f5c6ae0814fbe9ad7d28d34a5df203f685c4d49210c635ef2aae7e,2025-05-13T18:56:22.283000
|
||||
CVE-2025-4508,0,0,db75cb6eae1dbf24ca832411056b3b5c74810bdb70cc1a4953a84729f52cd4d0,2025-05-16T17:26:39.940000
|
||||
CVE-2025-45080,0,0,06a0f2cf3a479da0a1242f0af19e11456b7516b7534ba880f3dcc032666fd851,2025-07-03T15:14:12.767000
|
||||
@ -296509,7 +296513,7 @@ CVE-2025-45471,0,0,175cebfb698d65801503c809b3aa892182068d5ca8c7cb75b47dca0205a19
|
||||
CVE-2025-45472,0,0,2637a833bc8f30b44e037d16794888343f063d186f0716a0b1631b9011f38122,2025-05-23T16:15:25.777000
|
||||
CVE-2025-45474,0,0,5a86947a5dcb30409703950db611fb972ad2af49b62606364ea6d0524ca2d928,2025-06-19T00:45:23.457000
|
||||
CVE-2025-45475,0,0,7400d330caefeb635586e4a2df7792360a8bced766ed5816725e62dba811d485,2025-06-24T18:42:50.893000
|
||||
CVE-2025-45479,0,1,3af882597eb45f1ecabc1e7513c17c62bab5d806136fa3c5520cbf286e961559,2025-07-08T18:15:29.197000
|
||||
CVE-2025-45479,0,0,3af882597eb45f1ecabc1e7513c17c62bab5d806136fa3c5520cbf286e961559,2025-07-08T18:15:29.197000
|
||||
CVE-2025-4548,0,0,a8fe2cea464a0b35dbac9350217055ae490f25b77738ddb03311a9902dfffcb3,2025-05-13T18:55:54.360000
|
||||
CVE-2025-45487,0,0,ffb60bfe346afcb15249da2528ccd12c910ff9915205c63e38aaf38509c65e39,2025-05-13T20:19:05.490000
|
||||
CVE-2025-45488,0,0,a4a677b217c9c59760c1fc85e8b2f493a1b1fd5df028087d0ead93cd4bfeadf3,2025-05-13T20:19:15.500000
|
||||
@ -296967,7 +296971,7 @@ CVE-2025-46626,0,0,7abf1d44c797c4cee6d0659358053fc07e405fc64e6b7b169766beabd585f
|
||||
CVE-2025-46627,0,0,3d8472c35f4c293db5a4ff784edf9d44e4595bc9f81735bb25c23b2fd679b027,2025-05-27T14:23:32.547000
|
||||
CVE-2025-46628,0,0,7c44a610c0d1804dddb4aeb263e4ba59e0d21165371754c13454c2153982ddfe,2025-05-27T14:24:08.060000
|
||||
CVE-2025-46629,0,0,da524a24e0cf3860782403e964bf8da5b4bfe78ae92df276b84828ac896a5e9b,2025-05-27T14:24:23.877000
|
||||
CVE-2025-4663,1,1,f8cc3259f8b69d0c75e1fb494cceff8622625c6eb9a907360a0c221f310536c7,2025-07-08T18:15:39.507000
|
||||
CVE-2025-4663,0,0,f8cc3259f8b69d0c75e1fb494cceff8622625c6eb9a907360a0c221f310536c7,2025-07-08T18:15:39.507000
|
||||
CVE-2025-46630,0,0,f5aceb84026b4d6effd914e27138b07ec8b33a9bd06f3d0075b4585300aaa230,2025-05-27T14:24:30.130000
|
||||
CVE-2025-46631,0,0,609d4e770ff608bcd33d53d7092a95fd8b9faf4a9837f4d52772670d9e8b46d2,2025-05-27T14:24:42.853000
|
||||
CVE-2025-46632,0,0,0bf5e14d2a9861100f068ef9191d439e475832a5082afd70556ba0f5d20a6747,2025-05-27T14:17:19.890000
|
||||
@ -297350,7 +297354,7 @@ CVE-2025-47116,0,0,137a8d5062435ed03fec8e94fcca5accb2b2cd00d042dd35a0ed6a26a9dac
|
||||
CVE-2025-47117,0,0,ad3df63509d2764d93688d9d9f1a9b2e1a2a39de970d2426a955e41c43e223e3,2025-06-16T14:47:22.160000
|
||||
CVE-2025-4712,0,0,655cc7933dcbfa8299ca016577dc2e95743bc96639079a5634fc2b1e9ba99048,2025-05-27T14:10:29.530000
|
||||
CVE-2025-4713,0,0,07deb6148a7b9c61da4f7b5f9679e8b0482f4bcf7e19d344fe5ec15e4b57121a,2025-05-27T14:10:47.117000
|
||||
CVE-2025-47135,1,1,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000
|
||||
CVE-2025-47135,0,0,108cc60d1bd33d5a8335a3fa56d5ec5ebbf28658b48fd8c4fd7062bb198c651c,2025-07-08T18:15:29.440000
|
||||
CVE-2025-4714,0,0,ea07a9f4689461c2a8f9423bf631226225cddda92ad9e10d96306967ff6a2ec2,2025-05-27T14:10:53.560000
|
||||
CVE-2025-47149,0,0,2734c76650c27423981403171e8ba8344bf60f54ddfbffa7869e6a96d7489a05,2025-05-23T15:54:42.643000
|
||||
CVE-2025-4715,0,0,9a489c97c9d40720bd1d4e2feec8573f21fedd878a5e031a38c9126d1f627a14,2025-05-27T14:11:05.693000
|
||||
@ -297382,7 +297386,7 @@ CVE-2025-47181,0,0,0dcaa7da62eb599bc0c4884b7faedf2756f0f5de47436d94bd3a1a0bf83ba
|
||||
CVE-2025-4719,0,0,8f45404e8c5e0b5372b6c6d3c18e425f04bef83b0b8978ee2807105e5fc3ce21,2025-05-28T14:26:35.423000
|
||||
CVE-2025-4720,0,0,ab92b1fc5d01e1f35f68c76c8f5bceafc841c3ab0985f1035de502421e632bac,2025-05-27T14:13:08.100000
|
||||
CVE-2025-47201,0,0,f7da15483f84676db296d7fc167792c339031bbfa11c378fcc7b75aaf9edeb30,2025-05-07T16:51:09.947000
|
||||
CVE-2025-47202,0,1,749863a43a949eae176a9f79f8bb9c552e9f7907c1f6a89696fa727088d60e7c,2025-07-08T18:15:29.703000
|
||||
CVE-2025-47202,0,0,749863a43a949eae176a9f79f8bb9c552e9f7907c1f6a89696fa727088d60e7c,2025-07-08T18:15:29.703000
|
||||
CVE-2025-47203,0,0,5affb412d65195e809b09967884d230d1db85b53ddc355815b9628e8d17b2453,2025-05-17T22:15:18.390000
|
||||
CVE-2025-47204,0,0,1087581499a2135246bfaa4b4dda36ede5f4134f69e3bfd8a83443409525f3f7,2025-05-14T14:15:30.460000
|
||||
CVE-2025-4721,0,0,5b12152a812ee0a8141ca92ad1ce07fe54f58122d1a25434c4f23dc9f9b473ec,2025-05-27T14:13:32.497000
|
||||
@ -297454,7 +297458,7 @@ CVE-2025-47418,0,0,bdeebdcffdfcfa25a9c3fca2d88b0ef86304dd2bce949cfa926a70785bd61
|
||||
CVE-2025-47419,0,0,fc776138a91094c8a7b58fa141974765a03e9710eddfe22ed3c577752b353134,2025-05-07T14:13:20.483000
|
||||
CVE-2025-4742,0,0,ee2f2c0b14e93f0d64b20a7c52ca41f5d96685f95f979ed4c5b911d5d1c284ab,2025-05-16T14:42:18.700000
|
||||
CVE-2025-47420,0,0,c1bc73f65501af2caba4c7542063041141320145e66b4cd312289b27bba5f98a,2025-05-07T14:13:20.483000
|
||||
CVE-2025-47422,0,0,79cf1edab21b7689d22de2740d5aa6f2cd439f22093b3e706eca3fac9602d0cd,2025-07-08T16:18:14.207000
|
||||
CVE-2025-47422,0,1,2ceec0fcd5294140336881cd4df1e1e7adf34185c8fa15a129a05fa829fc1430,2025-07-08T21:15:25.947000
|
||||
CVE-2025-47423,0,0,6836a6f986120cb2e164a5663178ae0fd396b9a71521a1bcfcb70d3454021365,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47424,0,0,71d29b752922eab2f18ed784453e2b935bfb9c4385e21b85c68c2b1d9613d539,2025-05-12T17:32:32.760000
|
||||
CVE-2025-4743,0,0,f4e1132d4a1d65e64cd42fcffb62ca910ad40af2c0b6ee93feb69f0c1fc24629,2025-05-28T14:27:10.833000
|
||||
@ -298135,9 +298139,9 @@ CVE-2025-4838,0,0,cca1a773a7995c2ad406db6e7e45380cc26c88e64223942ad0ce97b436093f
|
||||
CVE-2025-48381,0,0,756a5877ed27d6f830d71523076b9f0b209034564b150120125feeff921c6b74,2025-05-30T16:31:03.107000
|
||||
CVE-2025-48382,0,0,fda2abd3eb2ff59b8a0db4b2d2d0e0568f8fbaa2c9c79701d2a0f694e0b39ac6,2025-05-28T15:01:30.720000
|
||||
CVE-2025-48383,0,0,cf4c4d78cccb4a8e745a90ad08bf26e619c1d79a5e63aba01e3bbb75890bb48a,2025-05-28T15:01:30.720000
|
||||
CVE-2025-48384,1,1,649ef9c8962fa5ed226cbbdc9d9bf8f525f48d02424a3f29996709b98b430152,2025-07-08T19:15:42.800000
|
||||
CVE-2025-48385,1,1,345dde91985669b36cebb25fa4a39b60ff3569bd81dd48380d624f6a6c340f28,2025-07-08T19:15:43.097000
|
||||
CVE-2025-48386,1,1,8ba8e9eaf914e1dc6a400a2ac44f024d773afb6088aafa049e1ed9967b690184,2025-07-08T19:15:43.410000
|
||||
CVE-2025-48384,0,0,649ef9c8962fa5ed226cbbdc9d9bf8f525f48d02424a3f29996709b98b430152,2025-07-08T19:15:42.800000
|
||||
CVE-2025-48385,0,0,345dde91985669b36cebb25fa4a39b60ff3569bd81dd48380d624f6a6c340f28,2025-07-08T19:15:43.097000
|
||||
CVE-2025-48386,0,0,8ba8e9eaf914e1dc6a400a2ac44f024d773afb6088aafa049e1ed9967b690184,2025-07-08T19:15:43.410000
|
||||
CVE-2025-48387,0,0,5a9701f9a81795a8700fe89d139a689f8cb6b45c5398ce1d738ebbe7a32c2c0c,2025-06-04T14:54:33.783000
|
||||
CVE-2025-48388,0,0,32cc6c7225fff7a8a04c56706a9bdbe077df02dc7ed8c5659d79c54081de3670,2025-05-29T14:29:50.247000
|
||||
CVE-2025-48389,0,0,6f9ce8e8f1dfe2b73d156bb6ed2a2e4ced06b31b72b79deae0df62fb947b20a5,2025-05-30T16:31:03.107000
|
||||
@ -298360,11 +298364,11 @@ CVE-2025-48912,0,0,4848d33489117f53b877c948399935df619e976eec472273191f1ca26ec72
|
||||
CVE-2025-48914,0,0,da6bad0c4d0e6121a9d50700e2fc20599407401d3911e3bb2477eba8adbe7eea,2025-06-18T15:57:07.227000
|
||||
CVE-2025-48915,0,0,d0d154b27b6b38bf355906ab2c27cbf671e5447a4489ef6508823c1eb32aeead,2025-06-18T15:57:25.617000
|
||||
CVE-2025-48916,0,0,064370efde96850d30de939e26f598a08846fb12f52793745ff31da22fd4e34e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48917,0,0,bd7eb02044cd2f99cb85df125650b8349625fe6598f432182d111b786e5bc1cf,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48918,0,0,184694eb757f07ddcc1c392a4b74cd0f9767a9352672d5134dfe4176e379839b,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48919,0,0,250c635537949cd1b5ab28203a10fb33850e6e420bc5d72aeb34c95331d3b334,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48917,0,1,434e69724c070443ac8288e8aa658f0f4853821345839fd8bd02ff078d9cc3b9,2025-07-08T20:35:15.717000
|
||||
CVE-2025-48918,0,1,79698f3fff42cfb0ecf3bc2277a2ef1598c620ded581a343b6534dcfe7129331,2025-07-08T20:34:54.967000
|
||||
CVE-2025-48919,0,1,1e532881ce312918fe4e6d20ceffc6d8e9527ae6c7eb25332b0b02c97bf31b78,2025-07-08T20:35:27.190000
|
||||
CVE-2025-4892,0,0,002d5f2a93da7cbbf0db54aa5606cb91f8377f6151252d2e3edadf3dcfd06185,2025-05-28T15:32:12.643000
|
||||
CVE-2025-48920,0,0,972aef7a974af9b9e19d043a72ec6dc3baf11fffefa29aa9bc7f1e546771863b,2025-06-16T12:32:18.840000
|
||||
CVE-2025-48920,0,1,4d517335088069cf3700512d78281b9ede8e66d945ac50e623bd1c1b75d1a8be,2025-07-08T20:35:36.687000
|
||||
CVE-2025-48921,0,0,bf8abbd438522ab19b03d1fef94a34f38eef0e3ce6985bd31edb7d679cf6c776,2025-06-26T18:57:43.670000
|
||||
CVE-2025-48922,0,0,5a39c3a2314efaec349abc0bfa7dca0f34477df009f53b13f84a3980bc0a5a03,2025-06-26T18:57:43.670000
|
||||
CVE-2025-48923,0,0,1b4953164a87b46a282bdab4066b15729f967660cf7b30e28abeb78958c86467,2025-06-26T18:57:43.670000
|
||||
@ -298735,10 +298739,23 @@ CVE-2025-49510,0,0,3bb8122e36ad249db39449b81c1d9bb5005e0826a2addc079025211cebc0d
|
||||
CVE-2025-49511,0,0,5857ce4f5934ac8d4eab419d1a69fa9027dcf280ff9a1fb08e4e3e1a5703ab2f,2025-06-12T16:06:39.330000
|
||||
CVE-2025-49520,0,0,8baebc35523945bd35de07d42fda2554b9e130dd2f1677e6b4b5b1fa3ba7d6b1,2025-07-03T15:14:12.767000
|
||||
CVE-2025-49521,0,0,2e21ab9896c671b2641a1fd6799eb79dcb95d338ad91c2250b20c876c8af9e40,2025-07-03T15:14:12.767000
|
||||
CVE-2025-49535,1,1,4443f64e5ad22cd9ee3abcaa1fe1818f3b1690983d77cef65cdcb6cddc715e43,2025-07-08T21:15:26.113000
|
||||
CVE-2025-49536,1,1,b380e572639396b81e564d2d10ddf131d4e1df6e5fd78c52d239c7102a1ed20c,2025-07-08T21:15:26.280000
|
||||
CVE-2025-49537,1,1,98a6d9e0cabab3646c697b2636d51d9640ee4d36347a350f3bf1a35dad5b7ddc,2025-07-08T21:15:26.437000
|
||||
CVE-2025-49538,1,1,b08abdfa01783bdedde5cbd2d93605684aca3f32a36dc12c60a269d3e7096a9f,2025-07-08T21:15:26.597000
|
||||
CVE-2025-49539,1,1,5fda7967846294efa188d04a661d755795244ba86353eae7eca35ff277e34f09,2025-07-08T21:15:26.757000
|
||||
CVE-2025-4954,0,0,1842fa5885eb88cf4e938c25f5c28a2b06178d338bd8f50c89b12e7a73a12077,2025-07-02T16:11:11.290000
|
||||
CVE-2025-49540,1,1,c0f8a5784412a376a14b9c297ed0c569b0d39ae366bc5bb925dde5d6a01e0996,2025-07-08T21:15:26.907000
|
||||
CVE-2025-49541,1,1,1e19202b7a7ab75211048ef54de3907587736ac10b5b45d74f3a423939a267fa,2025-07-08T21:15:27.060000
|
||||
CVE-2025-49542,1,1,252b318c939d04f76bf7c9b9fc7714ebed84e3f6d2c8374e91ef23539642e079,2025-07-08T21:15:27.213000
|
||||
CVE-2025-49543,1,1,6b2d9ef391d0cf9390c3ad2f98aef9a57cd7931469ac096bc8aa17967786bb76,2025-07-08T21:15:27.360000
|
||||
CVE-2025-49544,1,1,26c716eecb4e1c9ba05029057d0f31e3f5763e1b672dd0f597b5b6a8856f0cad,2025-07-08T21:15:27.520000
|
||||
CVE-2025-49545,1,1,303d97821b643af9eaea654a826f753b85097ef47b66877b2f2f77b46235cdc5,2025-07-08T21:15:27.670000
|
||||
CVE-2025-49546,1,1,93a0c78368822ac42c11d49fca9c399b41ceb17cb7b83c0358989200a549859a,2025-07-08T21:15:27.820000
|
||||
CVE-2025-49549,0,0,d51ae214ec023b9fbf2d300a776160828d2a71b7300d33bc04b291b25e1ecd5e,2025-06-26T18:57:43.670000
|
||||
CVE-2025-4955,0,0,dfeeeedd1c9e503552c289dc5a5f282eaa3f31fc9b39c1438869fa46290cc865,2025-07-02T19:25:30.180000
|
||||
CVE-2025-49550,0,0,81d29c0d656ad2b61bb825237b123272a33fd2799782f8797b7b40fb5e1f45eb,2025-06-26T18:57:43.670000
|
||||
CVE-2025-49551,1,1,b2def63370ea0a0fa1eb0ceec3b13a45083199872407356fbafaa99b42f4747e,2025-07-08T21:15:27.970000
|
||||
CVE-2025-49574,0,0,ec211dbe5543652a4df81f232ea6a683a4d467fc93142407aa7003d8d8ff4016,2025-06-23T20:16:21.633000
|
||||
CVE-2025-49575,0,0,5239212f6088f8e9f5d72981748315013281ee63030d12ad53f604f56fb5ce0a,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49576,0,0,d91dc4671dcd271f2349061a8890351137f780e1115b96e716a0a31c8aba01ac,2025-06-16T12:32:18.840000
|
||||
@ -298811,7 +298828,7 @@ CVE-2025-49688,0,0,c3181c8158e5c78a3e9757e8614291d536d5b924e30c09df27ea88ff40df6
|
||||
CVE-2025-49689,0,0,35eb742e6bcd2b62e7f00524d5d5cb6ff5527f10d1be75b1fc0ff7dd952dc206,2025-07-08T17:15:54.680000
|
||||
CVE-2025-4969,0,0,4f90cc424a2a0f4e9ed8afa3693879db2394c134460b9fa8753024f2852d3968,2025-05-21T20:24:58.133000
|
||||
CVE-2025-49690,0,0,2f9438abe69f3f23a6d3d7d908db4b110ab582293a18c3e8569fc96474cad054,2025-07-08T17:15:54.890000
|
||||
CVE-2025-49691,0,1,4b3e65b9c869003e199c54707d5236aa3f0388e9d4a9ef5039b5af35a2a045fd,2025-07-08T18:15:34.847000
|
||||
CVE-2025-49691,0,0,4b3e65b9c869003e199c54707d5236aa3f0388e9d4a9ef5039b5af35a2a045fd,2025-07-08T18:15:34.847000
|
||||
CVE-2025-49693,0,0,49673545f56b9ed3c34874b93756abacb26e5fc96f8870fb4448f0c76864fa34,2025-07-08T17:15:55.320000
|
||||
CVE-2025-49694,0,0,12ca25b40dbb653983a43bd4dac767f4aee5f01130ed80730bc92f666267e3c8,2025-07-08T17:15:55.503000
|
||||
CVE-2025-49695,0,0,3319a44c321323f2e413eb18051d9f9ec8ad498d254531e2e4727ee1b14b44db,2025-07-08T17:15:55.697000
|
||||
@ -299292,7 +299309,7 @@ CVE-2025-52487,0,0,7cd2bd74a4137e25655cda69485a3b65bad2829b1fa25c7a60a65991a011a
|
||||
CVE-2025-52488,0,0,ca6b051d0da46d813959bb70c94307ecd22ce69e425b14627b87b7e8b19e660f,2025-06-23T20:16:21.633000
|
||||
CVE-2025-5249,0,0,ed726cc2a905d079d3cf80f621868a312481896aae378521d98a1a546311541b,2025-06-24T15:55:43.913000
|
||||
CVE-2025-52491,0,0,99c966bc69ba38206055f8764fa30ca2e2a41c8a1159f64533a7a568f1fc2e2c,2025-07-03T15:14:12.767000
|
||||
CVE-2025-52492,0,1,0e8e96cc86cd5c8b84d9e46870c28bc54cdb82d25c05bd5e55a9a1b29e292bf5,2025-07-08T18:15:40.190000
|
||||
CVE-2025-52492,0,0,0e8e96cc86cd5c8b84d9e46870c28bc54cdb82d25c05bd5e55a9a1b29e292bf5,2025-07-08T18:15:40.190000
|
||||
CVE-2025-52496,0,0,c4a5290ed4a6829a338ece7b12a5b7bb4e1239eedf9c2a83e343760d73e782b4,2025-07-08T16:18:53.607000
|
||||
CVE-2025-52497,0,0,d15c25d27a40c01af95e0a09ebcb28bc3f303549d4a5549490bd6ec8d44a75dc,2025-07-08T16:18:53.607000
|
||||
CVE-2025-5250,0,0,2a4bdc606e390fc951ba8f4ded6d97e8a69fbc9ec9574eb66322c159fbee23de,2025-06-10T15:12:33.010000
|
||||
@ -299648,6 +299665,7 @@ CVE-2025-53338,0,0,69ee0c5b640fcd72e43f5a3a6d7505b4ccd5499b6d733162f15f39655cb80
|
||||
CVE-2025-53339,0,0,955bc6b5359aed429b44d347615d0e1318a1b809ec1e3579e3ed2353be810e81,2025-06-30T18:38:23.493000
|
||||
CVE-2025-5334,0,0,fb14475e980fb397de4901b9efdcaa30993615e4c74780c0502ee0c491e8e5cb,2025-07-02T17:31:56.563000
|
||||
CVE-2025-5335,0,0,5abfb5e74bc6ec2f8ed9b95f56ffcbd4f93dcd183997df85e24502ad95934637,2025-06-12T16:06:39.330000
|
||||
CVE-2025-53355,1,1,8d35bab09217d655776045296c71bfb70dc5971d57f3d2661db16dadac0d3714,2025-07-08T21:15:28.120000
|
||||
CVE-2025-53358,0,0,3d97a4954e653a509d4005c71cf64fbb269b7293bb5ffaddd5ae485b7c74944b,2025-07-03T15:13:53.147000
|
||||
CVE-2025-53359,0,0,45ed40db77640f47ba583ca32d5c60d80ffbacd98c4463b392cad98fdcfa3117,2025-07-03T15:13:53.147000
|
||||
CVE-2025-5336,0,0,51ebbfc8a6c001d043ad92fbb70974a3ccedacbc8290bd5643cc8faeb9732c02,2025-06-16T12:32:18.840000
|
||||
@ -299684,16 +299702,16 @@ CVE-2025-53415,0,0,a69e8e91492110c4dbcf675778ea91b79a25d896361aa62120c18b659d9f3
|
||||
CVE-2025-53416,0,0,5766bb5741c2eb8f5d7acde7664083885dadd438f2f420d57a6193893c29ac92,2025-06-30T10:15:26.127000
|
||||
CVE-2025-53473,0,0,a98e9bef8a3e8614654fd61fe5e312266f4052bbcda22460250a3d6a497eb2e1,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53478,0,0,aa7b2381d7181ee2b89b1383c51d82730ebb38c46cf0997958e21fb414371fe5,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53479,1,1,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000
|
||||
CVE-2025-53480,0,0,4f5aef8cd6a8f049627d2c4d0d717e279193b6c062dc19ec0f621c20e01dc62d,2025-07-08T16:18:14.207000
|
||||
CVE-2025-53481,0,1,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000
|
||||
CVE-2025-53482,0,1,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000
|
||||
CVE-2025-53483,0,1,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000
|
||||
CVE-2025-53484,0,1,e7ebb3bd44641163aa361e5115d82443e28ffae41dd741991df65066cbddf884,2025-07-08T18:15:41.130000
|
||||
CVE-2025-53485,0,1,c47b8c8c79dc09a9a1d934e677326e07d1ee6c87e1f92b3a503809cf81e70f10,2025-07-08T18:15:41.277000
|
||||
CVE-2025-53479,0,0,d40fec0cee63feb67a3f9256754b9dab9198b4d5af73ca36d7772139873aa11f,2025-07-08T18:15:40.387000
|
||||
CVE-2025-53480,0,1,d8383875b2422d51193c6751343fc73f1fb8675714156878ade9b707d83c0eb9,2025-07-08T21:15:28.227000
|
||||
CVE-2025-53481,0,0,6fc1e0a87cba085ed024fc5b3374d45e0211ca730bf92722cc171d880a81905d,2025-07-08T18:15:40.500000
|
||||
CVE-2025-53482,0,0,1920f2634050742befb0e985247a8637f5baaf6ae1103ac41377c2c70cf4dc47,2025-07-08T18:15:40.767000
|
||||
CVE-2025-53483,0,0,5257b2ac88a5fcf2d69cee51164cf061fc82bd54ca17911d88499bc110778167,2025-07-08T18:15:40.950000
|
||||
CVE-2025-53484,0,0,e7ebb3bd44641163aa361e5115d82443e28ffae41dd741991df65066cbddf884,2025-07-08T18:15:41.130000
|
||||
CVE-2025-53485,0,0,c47b8c8c79dc09a9a1d934e677326e07d1ee6c87e1f92b3a503809cf81e70f10,2025-07-08T18:15:41.277000
|
||||
CVE-2025-53486,0,0,b0a002c2440b9cff7e2c8fbad70a2079bf6a8361f9268a9757e051104d57f687,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53487,0,0,c0d5dff6ad1c29a23878b2ad903a2b1b68c7f902a012230b954b7fd0b5aeeb16,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53488,0,1,a88a928690cdf9e2c82e1b158aa7be4b11eda7dc66ebb5a16ee3d69f71d31849,2025-07-08T18:15:41.437000
|
||||
CVE-2025-53488,0,0,a88a928690cdf9e2c82e1b158aa7be4b11eda7dc66ebb5a16ee3d69f71d31849,2025-07-08T18:15:41.437000
|
||||
CVE-2025-53489,0,0,61c0dcb31ac6f85e08147ac28cdf6230d2757c86e00e7b07042fb935b7c08f66,2025-07-08T16:19:11.700000
|
||||
CVE-2025-5349,0,0,b81f7b1d6a71754537d9828ea9d3acc620d8f1e6efc544e4ef89ee68669bb4b8,2025-06-17T20:50:23.507000
|
||||
CVE-2025-53490,0,0,15355af9bf751ee5a421f08cf1d16ebdd0e807643ef3dedbea85630b9b6c461e,2025-07-08T16:19:11.700000
|
||||
@ -299701,11 +299719,11 @@ CVE-2025-53491,0,0,6b3662c2831fdd8c79ded4454ee2035fa60f94a03054090afb7fd7e68c185
|
||||
CVE-2025-53492,0,0,07f001f0a2f7c95ac8b92c2b5a1246aeb8bc752b3d49fd1f7521c3a7a3a64667,2025-07-03T16:15:23.957000
|
||||
CVE-2025-53493,0,0,8ff8929aef43b08923f020bb2cb71110d90a8f67f30ed1d7a0b2012c8c2477af,2025-07-03T16:15:24.123000
|
||||
CVE-2025-53494,0,0,208fc72eecce6b5a15d2bab2c5d282523f9dc3860f6acdfd211e204b9a94e60e,2025-07-03T15:13:53.147000
|
||||
CVE-2025-53495,0,1,b732a6116adb2001be4cc8405160ab51af8ae4bb0abdca064681e79af37bc484,2025-07-08T18:15:41.607000
|
||||
CVE-2025-53496,0,0,32bb968620be65542ddc8682da8b762a1ebbd838a8985a79351fabfecdf695de,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53495,0,1,56848ea1597fdf3921861d57f3d3c0df814f7e808f9a8ee638b3d3ead6ba1810,2025-07-08T20:15:30.183000
|
||||
CVE-2025-53496,0,1,64ad5663450c608739e4f92f49cf26be5e012b03208714c07709c5ba4201bd44,2025-07-08T20:15:30.430000
|
||||
CVE-2025-53497,0,0,5eae136538b70c3c37a94d0e58a284bca8a286c4bb1c1df40f1d02cade0ee419,2025-07-08T16:18:34.923000
|
||||
CVE-2025-53498,0,1,ac728ac1b33314fe6bc3b831eaf642bb2a65357fd5c5f806c0a8da0d93b87ddf,2025-07-08T18:15:41.787000
|
||||
CVE-2025-53499,0,1,21f7878566082f9b78f0f36dd45ea0a2c7a7e09065f4477321a274808baa3669,2025-07-08T18:15:41.973000
|
||||
CVE-2025-53498,0,1,cc8925afff59b0ad4b7c3e01a9d4d860c7090b508312b3cd6c9cd263d16d81df,2025-07-08T21:15:28.380000
|
||||
CVE-2025-53499,0,1,97e7adcc1a6a9f2f0df5015b748dd370860d034cdf43809e446427c804cca5df,2025-07-08T20:15:30.623000
|
||||
CVE-2025-53500,0,0,6bf8ca33713f3a2bab75c61f0f766e7ebebde783ecb1ccdda91000f21a8986cf,2025-07-08T16:19:11.700000
|
||||
CVE-2025-53501,0,0,ccac602c786f22315db263303b00facd2536cbcd4bbc6d4d87bf200450bbda9d,2025-07-08T16:19:11.700000
|
||||
CVE-2025-53502,0,0,5a7035089ea6976dad62bf0b0d470894d525c57cb053c618d3c57707f23fd14d,2025-07-08T16:19:11.700000
|
||||
@ -299733,9 +299751,9 @@ CVE-2025-53569,0,0,cdd0c7bd045f505f8a550a7ea0de012d1c57dbed78b7fa2473645446d7d9d
|
||||
CVE-2025-5357,0,0,907468d4a23bb292098ec30159d44f17f5a58704c8b53f5a961af7ce379d277f,2025-06-16T16:26:46.080000
|
||||
CVE-2025-5358,0,0,8d1b1a598434ecad4f0ae411fcaa51446d90f020f8729fd93cc9901ead4d16c2,2025-06-10T15:14:21.980000
|
||||
CVE-2025-5359,0,0,fbaee83932976cabc2c375b7182ecd49a378426f554e3965400f3dd72ff93c16,2025-06-10T15:14:30.460000
|
||||
CVE-2025-53599,0,1,e5245099382a4c248953baaee2eb51fbb56bc335d20eb343eacb3b8e7ba773bd,2025-07-08T18:15:42.157000
|
||||
CVE-2025-53599,0,0,e5245099382a4c248953baaee2eb51fbb56bc335d20eb343eacb3b8e7ba773bd,2025-07-08T18:15:42.157000
|
||||
CVE-2025-5360,0,0,f6f6f0a68bcc88f729faa5e7b6e62c265dbe0f87de895580450e0ebfdb395bd6,2025-06-03T15:35:19.237000
|
||||
CVE-2025-53600,0,1,e72225790578b22461a9a4c21fcb5500b01aeef3ab47e64653a58d903db5d2ec,2025-07-08T18:15:42.663000
|
||||
CVE-2025-53600,0,0,e72225790578b22461a9a4c21fcb5500b01aeef3ab47e64653a58d903db5d2ec,2025-07-08T18:15:42.663000
|
||||
CVE-2025-53602,0,0,80af5d7001cee4eb35e2703fbca47f96b312650580be3927abff93f135bbe250,2025-07-08T16:18:53.607000
|
||||
CVE-2025-53603,0,0,5db52850d120d71ef124e962842248708c198fe6e2675d8e1cf2ebbb02c0969f,2025-07-08T16:18:53.607000
|
||||
CVE-2025-53604,0,0,9daa2f4769c37bae33325e5cacbc0a5a446d78ff5f1e987c05793d3e6ebf1037,2025-07-08T16:18:53.607000
|
||||
@ -300217,7 +300235,7 @@ CVE-2025-5915,0,0,f4817e3f541276db8764595bab47239f1072f31f9c3d32c2caaee3b4950d68
|
||||
CVE-2025-5916,0,0,77a227907bb56f71f2bfd1bf497899ff1c8f6eb6d2e97956e9c7ee1b79bfbd3d,2025-06-12T16:06:47.857000
|
||||
CVE-2025-5917,0,0,0b15f8cb6694a25438c80b55bb7a5b265e6faccf484d04cd7c6d5563268713ff,2025-06-12T16:06:47.857000
|
||||
CVE-2025-5918,0,0,86b80ccf0910833edc22c6b7530445ae3be8c3d5eb7bba766fb3c183b6d35d2b,2025-06-12T16:06:47.857000
|
||||
CVE-2025-5920,0,1,3f88c3667885406165d1ae39a3379b564fa086388f88e17a8e52604b775465c3,2025-07-08T18:15:42.893000
|
||||
CVE-2025-5920,0,0,3f88c3667885406165d1ae39a3379b564fa086388f88e17a8e52604b775465c3,2025-07-08T18:15:42.893000
|
||||
CVE-2025-5923,0,0,bd32fa6b95a8f310c6b07918d04b1a4cdef7f962ecfa8c2518b68d11b4b0741e,2025-06-16T12:32:18.840000
|
||||
CVE-2025-5924,0,0,1e0410010add3fb12f15bcba25aa0b1ca33a0b31298295b4ef1a2ef96e5b14d1,2025-07-08T16:18:53.607000
|
||||
CVE-2025-5925,0,0,74cb0f740f96269546a558716b8983e19baddafe2aff8e369ed86d426f629748,2025-06-12T16:06:39.330000
|
||||
@ -300295,7 +300313,7 @@ CVE-2025-6035,0,0,b71b50bc0c235c19b2d078bb69ae3921b820489d58f8688dea7a7bdd7515f1
|
||||
CVE-2025-6039,0,0,6b84c21907e40cd684bcb033e3b9f89fbbdd3d87aa6c728045af124524704dc4,2025-07-08T16:18:53.607000
|
||||
CVE-2025-6040,0,0,76a8c143b5834b0cf93cda3bf80ab595e40b144f2532ce0d72ddcf42d08934bb,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6041,0,0,badfbc363966712654f0b1003b7bdd31a116fa19d6631eae2317fc8409f3f851,2025-07-08T16:18:53.607000
|
||||
CVE-2025-6044,0,1,3fbcb9c6995bb61db880596b61af0acd195caddf0700dfd01ae4b368d1f50245,2025-07-08T18:15:43.190000
|
||||
CVE-2025-6044,0,0,3fbcb9c6995bb61db880596b61af0acd195caddf0700dfd01ae4b368d1f50245,2025-07-08T18:15:43.190000
|
||||
CVE-2025-6050,0,0,d47183ee5e3fda427920d7ad78ff4ae3678a9feeabdcb745cd0f696af706f042,2025-06-17T20:50:23.507000
|
||||
CVE-2025-6052,0,0,f7b8f6bed96346c732cfe3c58915aaa99b04704580ca581c3769d9ac03c1036c,2025-06-16T12:32:18.840000
|
||||
CVE-2025-6055,0,0,a1414c05d6a8565eece9cbd85c74aae5128e8846318652e194e65bb36ec8b3a2,2025-06-16T12:32:18.840000
|
||||
@ -300868,7 +300886,7 @@ CVE-2025-6865,0,0,3661be516a9e5e23dcd11227295dae05a51dadb3b4dfd3d05e4e48f18b21c9
|
||||
CVE-2025-6866,0,0,f850614134e413eef544ae790b5507f7a4bb4f3e37bcebeee7db49f2cc8caa62,2025-07-01T12:14:15.277000
|
||||
CVE-2025-6867,0,0,797b38742e0fc520138f51ad1844034c0d48fc54725c8fa00d928041c3c92109,2025-07-08T14:38:01.107000
|
||||
CVE-2025-6868,0,0,17290be7b72aa7d2885fdcb973d1501e74c815ea60ed28515c77c383732515d3,2025-07-08T14:37:18.003000
|
||||
CVE-2025-6869,0,1,3e7b520107e1331e1d81dfed67c9275f6c57aadb6754575c1121f78c5c69a865,2025-07-08T18:14:47.197000
|
||||
CVE-2025-6869,0,0,3e7b520107e1331e1d81dfed67c9275f6c57aadb6754575c1121f78c5c69a865,2025-07-08T18:14:47.197000
|
||||
CVE-2025-6870,0,0,33b4ee3bc6c38a76acd1cde73247b685579503cd97259ec7089c0d68dd6fdfce,2025-07-01T18:22:04.620000
|
||||
CVE-2025-6871,0,0,f4648c2a15a35b77fb72a8d99236478d2f0c7650ac12a9c4b4cabf98124da666,2025-07-01T18:46:42.920000
|
||||
CVE-2025-6872,0,0,51405b2640558f541e53e2e77c6d8cb0f40fc9a87e23b56ebe82201e26bc5fee,2025-07-01T18:47:20.500000
|
||||
@ -300945,6 +300963,8 @@ CVE-2025-6962,0,0,f65c5ea7b99373b1a9855dc70c185d85075c1892627adaf80072b361308a0e
|
||||
CVE-2025-6963,0,0,44275f505fd32e81e69bb52414baf1be8e373248b7ffe857a4b14d50be164bee,2025-07-07T14:40:29.430000
|
||||
CVE-2025-6995,0,0,7b13a5a39a513866404553a42360b13c7cd18804a396552daf573ce610d37414,2025-07-08T16:18:14.207000
|
||||
CVE-2025-6996,0,0,bb768e06b01467d03128b27855e07bfbcba0271eecc64a64b2276cf474cfed86,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7030,1,1,52e23f1ceb13513064982b9c04a299b3420b12b28bdc1364165ec4105339fedf,2025-07-08T21:15:28.773000
|
||||
CVE-2025-7031,1,1,87dcf3ead2d6e93587306ac125db0b07ac03ac33faf58797d3a3b1839c361f89,2025-07-08T21:15:28.907000
|
||||
CVE-2025-7037,0,0,b07b90cf71f9637ef298c4a50f0e88d414ddf0e08711f7a76696405dc6fcd56c,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7046,0,0,59780b11937d03ed4ccc5b0e229eb16ce78f2772f010122dcf4771e66748fb6e,2025-07-08T16:18:53.607000
|
||||
CVE-2025-7053,0,0,fd9c537260c66ae5a5eee80d5c89e14a4b3e6e9926df22af4c5ebd179b63f858,2025-07-08T16:18:53.607000
|
||||
@ -301000,19 +301020,19 @@ CVE-2025-7116,0,0,3b84cbe6de82588af2701d62d5be2ae7f7b714d0505d729be945f7ffa04b2d
|
||||
CVE-2025-7117,0,0,f773227bbe8bdfda9177d212e29d113f4396a5f47c7935d1c0208c86e6cd989c,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7118,0,0,0d52f5a0875b5a0f638ef7151fbd2460a1631010329160b8f7e16f32240543c7,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7119,0,0,ed6e8efc4eb4aa5119baee595e39b064334638459b5f4c9fb12c608fa9f0d88d,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7120,0,1,93c7c5877402f5a2f60433d207415dfe8e59029219d3ec7581b4c3048f517ec5,2025-07-08T18:32:24.210000
|
||||
CVE-2025-7121,0,1,85d1b35564b6a8b1850b40a4701e75a2ba1d273d47d163accc0db23ee8ebb2a0,2025-07-08T18:29:57.147000
|
||||
CVE-2025-7122,0,1,d17425333f1b0746a2f16fe6c80480eb2789695b7f9f4b2f68ea923f1dd8e655,2025-07-08T18:29:46.427000
|
||||
CVE-2025-7123,0,1,28bba1cc4f254a8d0d143bc586ea13e35a7212c6b1a5e409dc5d85e2c6774c49,2025-07-08T18:29:37.083000
|
||||
CVE-2025-7124,0,1,5c984c7269ae0f9f02f70bdcc479f0aa5960d895afb0863264cccc899a3798d5,2025-07-08T18:29:28.530000
|
||||
CVE-2025-7125,0,1,50ec2d4c51654b6fac4c286db961873429398658e58c068cbe361198cc291fde,2025-07-08T18:29:21.273000
|
||||
CVE-2025-7126,0,1,cd3545d0b83ef63a54256d4df8ab971bb62772519d7a731a7df9a7238d629441,2025-07-08T18:29:12.300000
|
||||
CVE-2025-7127,0,1,e18a0c96b94ac26cf46eb7f023ac6d2917c8a19617c9cd28a432b66994e3a421,2025-07-08T18:29:02.537000
|
||||
CVE-2025-7128,0,1,4f542b513e3a8f2d6a314c5b534a49d3fd122b5cfa1f5d655d09ace7cd57e6eb,2025-07-08T18:28:35.423000
|
||||
CVE-2025-7129,0,1,752b7431813a25d447c90cfcbc5ab578891a293bb87713606bc6dd60f41ea5fa,2025-07-08T18:28:17.207000
|
||||
CVE-2025-7130,0,1,cd080878d50a88f334d58b1de0694972ebba0c153a9b10ece68c5a033926cdb4,2025-07-08T18:28:09.443000
|
||||
CVE-2025-7131,0,1,4ef5a7aae4241220ef5f63967c91d442948bebe87a849987817d0c01640cc53a,2025-07-08T18:28:00.197000
|
||||
CVE-2025-7132,0,1,1de3d4d5a5a0e375d364db3860b3b02480b54961a3c10d12fda7290bc1fa8ce3,2025-07-08T18:15:38.643000
|
||||
CVE-2025-7120,0,0,93c7c5877402f5a2f60433d207415dfe8e59029219d3ec7581b4c3048f517ec5,2025-07-08T18:32:24.210000
|
||||
CVE-2025-7121,0,0,85d1b35564b6a8b1850b40a4701e75a2ba1d273d47d163accc0db23ee8ebb2a0,2025-07-08T18:29:57.147000
|
||||
CVE-2025-7122,0,0,d17425333f1b0746a2f16fe6c80480eb2789695b7f9f4b2f68ea923f1dd8e655,2025-07-08T18:29:46.427000
|
||||
CVE-2025-7123,0,0,28bba1cc4f254a8d0d143bc586ea13e35a7212c6b1a5e409dc5d85e2c6774c49,2025-07-08T18:29:37.083000
|
||||
CVE-2025-7124,0,0,5c984c7269ae0f9f02f70bdcc479f0aa5960d895afb0863264cccc899a3798d5,2025-07-08T18:29:28.530000
|
||||
CVE-2025-7125,0,0,50ec2d4c51654b6fac4c286db961873429398658e58c068cbe361198cc291fde,2025-07-08T18:29:21.273000
|
||||
CVE-2025-7126,0,0,cd3545d0b83ef63a54256d4df8ab971bb62772519d7a731a7df9a7238d629441,2025-07-08T18:29:12.300000
|
||||
CVE-2025-7127,0,0,e18a0c96b94ac26cf46eb7f023ac6d2917c8a19617c9cd28a432b66994e3a421,2025-07-08T18:29:02.537000
|
||||
CVE-2025-7128,0,0,4f542b513e3a8f2d6a314c5b534a49d3fd122b5cfa1f5d655d09ace7cd57e6eb,2025-07-08T18:28:35.423000
|
||||
CVE-2025-7129,0,0,752b7431813a25d447c90cfcbc5ab578891a293bb87713606bc6dd60f41ea5fa,2025-07-08T18:28:17.207000
|
||||
CVE-2025-7130,0,0,cd080878d50a88f334d58b1de0694972ebba0c153a9b10ece68c5a033926cdb4,2025-07-08T18:28:09.443000
|
||||
CVE-2025-7131,0,0,4ef5a7aae4241220ef5f63967c91d442948bebe87a849987817d0c01640cc53a,2025-07-08T18:28:00.197000
|
||||
CVE-2025-7132,0,0,1de3d4d5a5a0e375d364db3860b3b02480b54961a3c10d12fda7290bc1fa8ce3,2025-07-08T18:15:38.643000
|
||||
CVE-2025-7133,0,0,991588cc9d893d0cdf1192072b00aa651521418de82987d3411555ff8ddb6ff2,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7134,0,0,f8a98630eb68e1197d3efbf13b0cc44fd1216fc8162ce3eff1c1f2c42885e72c,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7135,0,0,41e1371001b0c9ef44085404a200e473649f01c3deac2b86a0172c6dbc4db2b0,2025-07-08T16:18:34.923000
|
||||
@ -301020,7 +301040,7 @@ CVE-2025-7136,0,0,45646fd785818c71a478aed83adf45c1a4cb565720937384a9a078d615616d
|
||||
CVE-2025-7137,0,0,8983e1bf8f43863ce4f3f3d6f23024ad00aebb51f44c9e8edbd10012f2c687aa,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7138,0,0,ae8525b701f55d58f0bde6f3ef93def87c220f38764214ee2dec062f5e03c07e,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7139,0,0,5974606ad6695b4cd0807fe600a627598e553b510292b30a15346a03a3610524,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7140,0,1,ee3691bb6ac580bef84ba0971b5805e89c3455f8695d9cd83c6ff4b04d4a70e3,2025-07-08T18:15:43.450000
|
||||
CVE-2025-7140,0,0,ee3691bb6ac580bef84ba0971b5805e89c3455f8695d9cd83c6ff4b04d4a70e3,2025-07-08T18:15:43.450000
|
||||
CVE-2025-7141,0,0,91bf30706d80178a64d73ad4398d761f9bfe48a3924768f5bbdc2462c5938cca,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7142,0,0,f3c4612d75128afaaec302137d96e08fc71bd22932973c9685675017b248699e,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7143,0,0,d46fdb4db53a461dacbcdd92c4ff8e70d63a184f1ab1012d00779e40a993a88f,2025-07-08T16:18:34.923000
|
||||
@ -301029,11 +301049,11 @@ CVE-2025-7145,0,0,f23a6abe9ee91bf327047a5646fd46bd6ebe3d3fd2e0c356723d58f28175eb
|
||||
CVE-2025-7146,0,0,638c7729a530d780a31a04422b11c82b6d91f8fa46f4f9240650edec94b5621f,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7147,0,0,021f03d37684dbb6aa814091861efc10cfc4822508e3b0431afdb9a262daa57a,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7148,0,0,004c748c2eb135aa459011e3f784e052707494e929bdf0250b572031d5537c4f,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7149,0,1,8a7428714c1fa4042d2489510219db7fdc31ced77d47276f84ee86cf4e6153cb,2025-07-08T19:18:56.090000
|
||||
CVE-2025-7150,0,1,2843258b530da5e94783f30abf3db730206add33e73848122056dfa6669b7683,2025-07-08T19:18:47.723000
|
||||
CVE-2025-7151,0,1,3732f760fcd97a08fc983c3e6f1e93a25032e50bb4de4e9ecf4b4932b5afb19c,2025-07-08T19:18:20.233000
|
||||
CVE-2025-7152,0,1,8c602f26520d44c90a3bf2f83a70f0be1e2aaff9557fe0bde02b82eb0c6ecaa3,2025-07-08T19:13:54.260000
|
||||
CVE-2025-7153,0,1,fe10815e79f0fe609c213bce8aabdaa93cce4b6ae0958e19d2bf8a5552e217cb,2025-07-08T19:07:03.017000
|
||||
CVE-2025-7149,0,0,8a7428714c1fa4042d2489510219db7fdc31ced77d47276f84ee86cf4e6153cb,2025-07-08T19:18:56.090000
|
||||
CVE-2025-7150,0,0,2843258b530da5e94783f30abf3db730206add33e73848122056dfa6669b7683,2025-07-08T19:18:47.723000
|
||||
CVE-2025-7151,0,0,3732f760fcd97a08fc983c3e6f1e93a25032e50bb4de4e9ecf4b4932b5afb19c,2025-07-08T19:18:20.233000
|
||||
CVE-2025-7152,0,0,8c602f26520d44c90a3bf2f83a70f0be1e2aaff9557fe0bde02b82eb0c6ecaa3,2025-07-08T19:13:54.260000
|
||||
CVE-2025-7153,0,0,fe10815e79f0fe609c213bce8aabdaa93cce4b6ae0958e19d2bf8a5552e217cb,2025-07-08T19:07:03.017000
|
||||
CVE-2025-7154,0,0,2299aa206bbc4f8d93f86128263120c257f2298fc6125efe3203f9afed36f50c,2025-07-08T17:16:04.893000
|
||||
CVE-2025-7155,0,0,58e370e7ec7988674d77a511a3ff36b5467daefbad49af1d9fa200a15415ab00,2025-07-08T17:16:05.053000
|
||||
CVE-2025-7156,0,0,c9f9f5ddb7fd9ddfb4311cb647b3794a82654b2d90d22e935c7083c26b3f936d,2025-07-08T16:18:14.207000
|
||||
@ -301044,8 +301064,8 @@ CVE-2025-7160,0,0,0a96e36e0df846848d7566ff5ef62a9c77366ba93d07032d813cc997f581cd
|
||||
CVE-2025-7161,0,0,cc6bc9840b197bee88df77d8faba4cf23ad47cea0c9a791291e489681097183f,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7162,0,0,90b2f73d26f682f7cee18646a0143d7390bb10c25310197eb5639998b06b969c,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7163,0,0,93e6589fb5ad8f884d8da93aa6b077efaf2c5a0c70cf7cf17392ac98c7a1a0fa,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7164,0,1,0a3f306d8332fc6badec6fe7bd069d6887b9a4b009126806a3d69c78cbc5e44b,2025-07-08T19:19:05.190000
|
||||
CVE-2025-7165,0,1,dd8b42eb9c5811489db443554fc0c7de5e4ad32152cf2087c80f5c16200da11e,2025-07-08T19:19:10.427000
|
||||
CVE-2025-7164,0,0,0a3f306d8332fc6badec6fe7bd069d6887b9a4b009126806a3d69c78cbc5e44b,2025-07-08T19:19:05.190000
|
||||
CVE-2025-7165,0,0,dd8b42eb9c5811489db443554fc0c7de5e4ad32152cf2087c80f5c16200da11e,2025-07-08T19:19:10.427000
|
||||
CVE-2025-7166,0,0,bc9ebf3b335c7fdc7b70a0a7ac6fb710f89d50c11241cf0367b79f4538ea36ba,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7167,0,0,880b852ba5fba7f190ff654cb7138f849a5ee424ea4fcf87f14b7e1894f51a2a,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7168,0,0,620ee3f8442160918282988681b7d0090fce9b52642e1764980c995724879dd5,2025-07-08T16:18:14.207000
|
||||
@ -301053,29 +301073,33 @@ CVE-2025-7169,0,0,e456290914a8833027d80cbaa0a36dc25bfec6f4245e26db7db69ce96a1207
|
||||
CVE-2025-7170,0,0,9a24d32ac6d2b74a7fd27638f86e55519cc35a33f38bc61b6ccef34a18a68a6e,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7171,0,0,4eecd9580c80046579789154979a37316d07efc4d837652b0978958a75dadb43,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7172,0,0,8ed2e1a4363975256117b1c08b08d16a3d4461e5a582120297a43c43aba9f9a3,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7173,0,1,bfd17da7d6331fce3ec2a695d283ea7ca375ee439f983b917058c769fb410cde,2025-07-08T18:15:21.147000
|
||||
CVE-2025-7174,0,1,3bd53b4358c3350906c892b443ef49c409c23d00181cdbe3890c920664870d71,2025-07-08T19:19:16.303000
|
||||
CVE-2025-7175,0,1,370466751731a19aca025067fde38f357abebb527536a8357d8b896fb4fbbd1d,2025-07-08T19:19:24.460000
|
||||
CVE-2025-7176,0,1,144de86db5a83413efa8a17852602b5d703b62975fb69e68765fedf0d6d0c478,2025-07-08T19:19:37.170000
|
||||
CVE-2025-7177,0,1,a001ce100caa61e736edbfdda23967789fad04f3973113d7792117c9c94c5e42,2025-07-08T19:19:47.680000
|
||||
CVE-2025-7178,0,1,ab713ac24bc7f779767846e0ef563381651f50ae02ea5009f8d9c349711ed3b9,2025-07-08T19:37:21.010000
|
||||
CVE-2025-7179,0,1,d4ba849acef065f57ca446bf1b37f6994f2176aedc5036f051c1143d20039bd9,2025-07-08T19:37:32.997000
|
||||
CVE-2025-7180,0,1,7c862ba38b3226fe33a6b6416310536ef07fb1f72ca6b726e721beda890b9036,2025-07-08T19:41:32.147000
|
||||
CVE-2025-7181,0,1,4b7f7e93e31e58b0b53f99ec28393fb88276b22db4344c11fb59060b6da894b4,2025-07-08T19:40:53.907000
|
||||
CVE-2025-7173,0,0,bfd17da7d6331fce3ec2a695d283ea7ca375ee439f983b917058c769fb410cde,2025-07-08T18:15:21.147000
|
||||
CVE-2025-7174,0,0,3bd53b4358c3350906c892b443ef49c409c23d00181cdbe3890c920664870d71,2025-07-08T19:19:16.303000
|
||||
CVE-2025-7175,0,0,370466751731a19aca025067fde38f357abebb527536a8357d8b896fb4fbbd1d,2025-07-08T19:19:24.460000
|
||||
CVE-2025-7176,0,0,144de86db5a83413efa8a17852602b5d703b62975fb69e68765fedf0d6d0c478,2025-07-08T19:19:37.170000
|
||||
CVE-2025-7177,0,0,a001ce100caa61e736edbfdda23967789fad04f3973113d7792117c9c94c5e42,2025-07-08T19:19:47.680000
|
||||
CVE-2025-7178,0,0,ab713ac24bc7f779767846e0ef563381651f50ae02ea5009f8d9c349711ed3b9,2025-07-08T19:37:21.010000
|
||||
CVE-2025-7179,0,0,d4ba849acef065f57ca446bf1b37f6994f2176aedc5036f051c1143d20039bd9,2025-07-08T19:37:32.997000
|
||||
CVE-2025-7180,0,0,7c862ba38b3226fe33a6b6416310536ef07fb1f72ca6b726e721beda890b9036,2025-07-08T19:41:32.147000
|
||||
CVE-2025-7181,0,0,4b7f7e93e31e58b0b53f99ec28393fb88276b22db4344c11fb59060b6da894b4,2025-07-08T19:40:53.907000
|
||||
CVE-2025-7182,0,0,816761ee708d90c23f2101cd81755c9bccd46a8c07c0a43143b9cfce455d4b57,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7183,0,0,ccdd5d58c142202b58daa539c0628044ad27426c083019a60c5ec2ba302d2f31,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7184,0,0,b36192440b04372f0b76ab86332bc5e9fbd387fb3afec205f2754cf12b8a49e8,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7185,0,0,efb55944b7fb1e5594e9b0b3d82e4737318c9f596e1a66fa8c18cd50c9df8e7b,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7186,0,0,3e6decafa53bdd3c2b6eb7bcfd93b74d01c2d323b5f7694cb6fa567d6e716537,2025-07-08T17:16:05.833000
|
||||
CVE-2025-7187,0,0,c62bae007d51dfb9ccba8b5f7344f3ff8a6b9f74d232eb4fcb14b6aad63a7b13,2025-07-08T17:16:06.057000
|
||||
CVE-2025-7188,1,1,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8e1,2025-07-08T18:15:45.063000
|
||||
CVE-2025-7189,1,1,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000
|
||||
CVE-2025-7190,1,1,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000
|
||||
CVE-2025-7191,1,1,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000
|
||||
CVE-2025-7188,0,0,4c3d913ed14de1eb57706a8dc50d9a2e698e5e43a5bc5bbfb22fa6bad237b8e1,2025-07-08T18:15:45.063000
|
||||
CVE-2025-7189,0,0,8f84df0755649db6f2e8f138025fbb73232ebd734527af4887f6a4f01e491132,2025-07-08T18:15:46.273000
|
||||
CVE-2025-7190,0,0,75c864e411e3c9537f814458631c6d27ebf0955383e9bfa84c59e49ab369e25a,2025-07-08T19:15:43.943000
|
||||
CVE-2025-7191,0,0,19c40554d9df3cc04931ac06e93e1a6ee08ad5c50b064f50507dda485184ff15,2025-07-08T19:15:44.300000
|
||||
CVE-2025-7192,1,1,de4d47a0d0caa10b6c32236d74c1d4049c224edd4b9b94b80df4ea7f27bcee6c,2025-07-08T20:15:30.830000
|
||||
CVE-2025-7193,1,1,f202b853246642291a3c8d27f1f56b984eeeb382277fb4f6adffa903a81e9b64,2025-07-08T20:15:31.040000
|
||||
CVE-2025-7194,1,1,956d41a4e60bb5a9737889fb6a500ad51794228786e32e4107fa56bdc9b0f253,2025-07-08T21:15:29.763000
|
||||
CVE-2025-7196,1,1,fde145ca1c98c14c42a9e29e593cd8de99d5b874d9c2e3ed2c7b27f4033299ef,2025-07-08T21:15:29.963000
|
||||
CVE-2025-7259,0,0,8fd7864e8f7fb6c249652178c4014f15a5857d3e35a24f0168719b78d426bcb5,2025-07-08T16:18:34.923000
|
||||
CVE-2025-7326,0,0,7483fa577d73a18bc380df3b53d59526c96cf483de8c4617271f38405405a76d,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7327,0,0,a0fb7d73224d0b20e5509ef1c0447ce978b71b86006dd59d1e903714c73ecb3c,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7345,0,0,e15e76873bb3b168f71a5d766c4cd2e1bed2b8ba3fb754b723996140dde704f6,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7346,0,0,0fee3d68122e9af468e47512e4d9d848586d1a84e0ff7cd695bcb12ab8e33bea,2025-07-08T16:18:14.207000
|
||||
CVE-2025-7362,1,1,02130a85c1c6d05a11bb14ef506a7d903b4fe58c8e7f8a6897a5073d63357426,2025-07-08T18:15:46.797000
|
||||
CVE-2025-7363,1,1,385fe29622c6056496489adb0027c4ebe22bb337ef24fdf5e5d804e8ad6be343,2025-07-08T18:15:46.913000
|
||||
CVE-2025-7362,0,0,02130a85c1c6d05a11bb14ef506a7d903b4fe58c8e7f8a6897a5073d63357426,2025-07-08T18:15:46.797000
|
||||
CVE-2025-7363,0,0,385fe29622c6056496489adb0027c4ebe22bb337ef24fdf5e5d804e8ad6be343,2025-07-08T18:15:46.913000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user