mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-07-09 16:05:11 +00:00
Auto-Update: 2025-07-03T14:00:13.368046+00:00
This commit is contained in:
parent
aa2458220b
commit
86b772bf12
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2023-37229",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-10T14:15:12.140",
|
||||
"lastModified": "2024-09-10T17:35:05.483",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:16:01.333",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:loftware:spectrum:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "5.1",
|
||||
"matchCriteriaId": "0FB7E184-B2DF-4985-A54A-BB3C99A40149"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://code-white.com",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Not Applicable"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://code-white.com/public-vulnerability-list/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41435",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-03T19:15:14.340",
|
||||
"lastModified": "2024-09-03T21:35:10.947",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:52:19.633",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:yugabyte:yugabytedb:2.21.1.0:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "0ED89E04-A18C-4840-A597-4B3AFE2A302E"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ycybfhb/1427881e7db911786837d32b0669e06b",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/yugabyte/yugabyte-db/issues/22967",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-41436",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-03T19:15:14.460",
|
||||
"lastModified": "2024-09-03T20:35:15.853",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:51:14.427",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:clickhouse:clickhouse:24.3.3.102:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "ADF9BCEF-74CF-4BD0-8276-0A0764350AA4"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ycybfhb/db127ae9d105a4d20edc9f010a959016",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/ClickHouse/ClickHouse/issues/65520",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42759",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T19:15:13.270",
|
||||
"lastModified": "2024-09-10T16:35:05.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:24:25.260",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,38 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ellevo:ellevo:6.2.0.38160:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D4931CCB-03B9-4F9B-90A4-3593B0FD1BD2"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://csflabs.github.io/cve/2024/09/06/cve-2024-42759-approval-of-your-own-ticket-with-BFLA.html",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://ellevo.com/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42885",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-05T16:15:07.720",
|
||||
"lastModified": "2024-09-05T18:35:07.060",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:43:25.490",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:esafenet:cdg:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "5.6",
|
||||
"matchCriteriaId": "9925BD1F-AB69-4FA2-960F-8992EFD7D607"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://supervisor0.notion.site/ESAFENET-CDG-SQL-Injection-17d7e244810147f697c3c42a884f932b",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42901",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-03T18:15:08.507",
|
||||
"lastModified": "2024-09-03T20:35:17.380",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:04:06.263",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,39 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.5.12",
|
||||
"matchCriteriaId": "134D6C44-602A-4038-A78A-7D24486CB381"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/LimeSurvey/LimeSurvey/pull/3884",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Patch"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42901",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-42902",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-03T18:15:08.583",
|
||||
"lastModified": "2024-09-03T19:40:46.783",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:59:01.233",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:limesurvey:limesurvey:*:*:*:*:*:*:*:*",
|
||||
"versionEndIncluding": "6.6.2",
|
||||
"matchCriteriaId": "8A894F6B-1565-4490-B4EB-B1C29BD39C88"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://bugs.limesurvey.org/view.php?id=19639",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Broken Link"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/LimeSurvey/LimeSurvey/blob/6434b12ded1c4b6516200c453441d0896e11eee0/vendor/kcfinder/js_localize.php#L19",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/sysentr0py/CVEs/tree/main/CVE-2024-42902",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-44085",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-09-09T20:15:04.980",
|
||||
"lastModified": "2024-09-10T15:35:08.883",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:20:51.480",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,46 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:onlyoffice:onlyoffice:*:*:*:*:document_server:*:*:*",
|
||||
"versionEndExcluding": "8.1.0",
|
||||
"matchCriteriaId": "B397E390-1365-45B0-9C70-CC157CA62E2C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.onlyoffice.com/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Product"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2023-027.txt",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.syss.de/pentest-blog/cross-site-scripting-schwachstelle-in-onlyoffice-docs-syss-2023-027",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-45919",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-07T21:15:18.083",
|
||||
"lastModified": "2024-10-10T12:57:21.987",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:48:58.623",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -40,6 +40,16 @@
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "NVD-CWE-noinfo"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
|
||||
"type": "Secondary",
|
||||
@ -51,10 +61,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:solvait:solvait:24.4.2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "D0CA789A-00E1-452B-AD6A-BE55DE47E517"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gist.github.com/ipxsec/28afaf965389283a68433c7afd54d17a",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46486",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-04T17:15:17.173",
|
||||
"lastModified": "2024-10-07T19:37:29.423",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:52:36.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,14 +51,51 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"operator": "AND",
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:tp-link:tl-wdr5620_firmware:2.3:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "2E82C235-5B14-4FA3-A6CD-082EE2106692"
|
||||
}
|
||||
]
|
||||
},
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": false,
|
||||
"criteria": "cpe:2.3:h:tp-link:tl-wdr5620:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "9AA35C83-DDC5-4594-8719-C6FB5D4EF1C3"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/fishykz/TP-POC",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://yuhehe88.github.io/2024/09/04/TL-WDR5620-Gigabit-Edition-v2-3/",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-46535",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2024-10-14T17:15:13.440",
|
||||
"lastModified": "2025-03-18T15:15:54.450",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:11:38.520",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,32 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:ketr:jepaas:7.2.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "586A6F83-5418-4E07-8F7B-26E3C6B7E4DA"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://gitee.com/ketr/jepaas-release/issues/IAPJ8H?from=project-issue",
|
||||
"source": "cve@mitre.org"
|
||||
"source": "cve@mitre.org",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Issue Tracking",
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2024-6971",
|
||||
"sourceIdentifier": "security@huntr.dev",
|
||||
"published": "2024-10-11T13:15:16.537",
|
||||
"lastModified": "2024-10-15T12:58:51.050",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:39:58.133",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -16,6 +16,28 @@
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "nvd@nist.gov",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
],
|
||||
"cvssMetricV30": [
|
||||
{
|
||||
"source": "security@huntr.dev",
|
||||
@ -51,10 +73,31 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:a:parisneo:lollms-webui:9.8:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "6F93D924-2E1A-4DCB-B998-F717A6407BDD"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://huntr.com/bounties/fbfe7cd0-99fb-4305-bd07-8b573364109e",
|
||||
"source": "security@huntr.dev"
|
||||
"source": "security@huntr.dev",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-17xx/CVE-2025-1708.json
Normal file
80
CVE-2025/CVE-2025-17xx/CVE-2025-1708.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-1708",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:21.810",
|
||||
"lastModified": "2025-07-03T12:15:21.810",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application is vulnerable to SQL injection attacks. An attacker is able to dump the PostgreSQL database and read its content."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 8.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-89"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-17xx/CVE-2025-1709.json
Normal file
80
CVE-2025/CVE-2025-17xx/CVE-2025-1709.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-1709",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:21.997",
|
||||
"lastModified": "2025-07-03T12:15:21.997",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Several credentials for the local PostgreSQL database are stored in plain text (partially base64 encoded)."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-256"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-17xx/CVE-2025-1710.json
Normal file
80
CVE-2025/CVE-2025-17xx/CVE-2025-1710.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-1710",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.137",
|
||||
"lastModified": "2025-07-03T12:15:22.137",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-17xx/CVE-2025-1711.json
Normal file
80
CVE-2025/CVE-2025-17xx/CVE-2025-1711.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-1711",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.270",
|
||||
"lastModified": "2025-07-03T12:15:22.270",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple services of the DUT as well as different scopes of the same service reuse the same credentials."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1392"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21222",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:45.850",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:17:51.020",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,146 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "640C45C8-83C3-4BBC-9176-705BEAA80E64"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "4CE9402D-6417-4F82-909A-D89C06C98794"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "ED4B5FB3-A574-4DA6-9A43-0950B121CC92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0DA8E1E4-0C78-4ADC-9490-4A608D8601FD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "99601356-2DEE-482F-BCBC-A5C7D92D2D74"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21222",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-21247",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-11T17:16:20.400",
|
||||
"lastModified": "2025-03-11T17:16:20.400",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:41:26.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,146 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5608",
|
||||
"matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5608",
|
||||
"matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.5039",
|
||||
"matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.5039",
|
||||
"matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3403",
|
||||
"matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3270",
|
||||
"matchCriteriaId": "AAACC9C4-DDC5-4059-AFE3-A49DB2347A86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1486",
|
||||
"matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3403",
|
||||
"matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-21247",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24035",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-11T17:16:25.373",
|
||||
"lastModified": "2025-03-11T17:16:25.373",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:54:34.513",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,146 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5608",
|
||||
"matchCriteriaId": "83256070-991F-404C-AE4C-CBB46166CA67"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5608",
|
||||
"matchCriteriaId": "A1F779E2-8536-4B06-A151-6115C9D88D29"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22621.5039",
|
||||
"matchCriteriaId": "0B27CE48-66A0-488B-A7B6-18A5A191AFDA"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.5039",
|
||||
"matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3403",
|
||||
"matchCriteriaId": "84168D48-1F68-4590-98BB-E926339D1A01"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x86:*",
|
||||
"matchCriteriaId": "AB425562-C0A0-452E-AABE-F70522F15E1A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
|
||||
"matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3270",
|
||||
"matchCriteriaId": "AAACC9C4-DDC5-4059-AFE3-A49DB2347A86"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.25398.1486",
|
||||
"matchCriteriaId": "EF423F8C-2E8A-46AB-BB2D-C416BF341F92"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.26100.3403",
|
||||
"matchCriteriaId": "CF81B44C-8FF7-4C61-9974-3F98DA9D492C"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24035",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24060",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:46.193",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:09:11.443",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,109 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24060",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24062",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:46.353",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:07:14.593",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,91 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24062",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24071",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-03-11T17:16:29.867",
|
||||
"lastModified": "2025-04-16T16:15:29.953",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:23:25.997",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,18 +51,130 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "6997DE6E-CBAD-4690-A68C-8F10E477DCC2"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20947",
|
||||
"matchCriteriaId": "3CBCF6D9-5085-473C-82F5-98BC246A9C4C"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "0CF0E174-4692-4AA3-B72E-12E73A1BDBE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "340EF5F8-D4F5-4AD8-9D80-1DEC2F376BE5"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "67C8DCD7-90C4-431F-BD03-FDFDE170E748"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "05169574-28AB-4E42-B3DE-710574BB1AD3"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.22631.5039",
|
||||
"matchCriteriaId": "77DC7D9D-F85F-41B4-A944-D27B388A1157"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3476",
|
||||
"matchCriteriaId": "37ACC628-E175-4240-8166-C45995518331"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3476",
|
||||
"matchCriteriaId": "71D7DCBF-A571-4A16-8F32-FE24150917C0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7876",
|
||||
"matchCriteriaId": "C7610CDB-A02B-4C62-B17F-6DCE2B3DE4F0"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7009",
|
||||
"matchCriteriaId": "D271422D-A29F-4DBF-BF72-BCD90E393A5A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3328",
|
||||
"matchCriteriaId": "C1426FF0-A402-4149-9F2B-0FA3CEB4BB5B"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1486",
|
||||
"matchCriteriaId": "96046A7B-76A1-4DCF-AEA5-25344D37E492"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3476",
|
||||
"matchCriteriaId": "DFE44B43-DB8C-46E0-8344-C22ED7406A50"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24071",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24071-spoofing-vulnerability-in-microsoft-windows-file-explorer-detection-scrip",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Exploit",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
},
|
||||
{
|
||||
"url": "https://www.vicarius.io/vsociety/posts/cve-2025-24071-spoofing-vulnerability-in-microsoft-windows-file-explorer-mitigation-script",
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108"
|
||||
"source": "af854a3a-2127-422b-91ae-364da2661108",
|
||||
"tags": [
|
||||
"Mitigation",
|
||||
"Third Party Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24073",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:46.543",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:04:30.673",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,139 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24073",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-24074",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:46.740",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:03:00.923",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,109 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-24074",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
72
CVE-2025/CVE-2025-25xx/CVE-2025-2537.json
Normal file
72
CVE-2025/CVE-2025-25xx/CVE-2025-2537.json
Normal file
@ -0,0 +1,72 @@
|
||||
{
|
||||
"id": "CVE-2025-2537",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-07-03T13:15:27.337",
|
||||
"lastModified": "2025-07-03T13:15:27.337",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled ThickBox JavaScript library (version 3.1) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/auto-thickbox/trunk/js/auto-thickbox.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/nextgen-gallery/trunk/static/Lightbox/thickbox/thickbox.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/youtube-video-player/trunk/front_end/scripts/youtube_embed_front_end.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3281159%40nextgen-gallery&old=3276142%40nextgen-gallery&sfp_email=&sfph_mail=",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/59ea7390-3587-4fce-b267-bf525dbe3e27?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
84
CVE-2025/CVE-2025-25xx/CVE-2025-2540.json
Normal file
84
CVE-2025/CVE-2025-25xx/CVE-2025-2540.json
Normal file
@ -0,0 +1,84 @@
|
||||
{
|
||||
"id": "CVE-2025-2540",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-07-03T12:15:24.483",
|
||||
"lastModified": "2025-07-03T12:15:24.483",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Multiple plugins for WordPress are vulnerable to Stored Cross-Site Scripting via the plugin's bundled prettyPhoto library (version 3.1.6) in various versions due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
|
||||
"baseScore": 6.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.1,
|
||||
"impactScore": 2.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/awesome-gallery/trunk/js/jquery.prettyPhoto.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/awesome-wp-image-gallery/trunk/js/jquery.prettyPhoto.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/easy-image-gallery/trunk/includes/lib/prettyphoto/jquery.prettyPhoto.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/woo-3d-viewer/trunk/includes/ext/prettyPhoto/js/jquery.prettyPhoto.init.min.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/browser/wp-video-lightbox/trunk/js/jquery.prettyPhoto.js",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3266651/wp-video-lightbox",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://plugins.trac.wordpress.org/changeset/3282390/woo-3d-viewer",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/82892be3-91d5-4350-96b0-dc68a67b4637?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26635",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:47.337",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:00:05.107",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,91 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "13A4A79D-8D45-48FA-84F5-CE1A78E8E424"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "03AB53EC-354E-4F30-A278-2835CA341503"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26635",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26637",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:47.490",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T13:03:14.377",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -51,10 +51,126 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "575117BF-9A1E-4B90-85D8-4172A58B3B72"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.10240.20978",
|
||||
"matchCriteriaId": "B3B4804C-685B-4F37-92DE-CE73D1B106B4"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "474622F8-06D4-4AD1-8D72-A674909A7634"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:x86:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "559D55D4-2BF2-4B8F-90CA-C6B885334A3E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
|
||||
"matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.14393.7969",
|
||||
"matchCriteriaId": "6A232AB6-1EC5-44E7-AB75-0EB9A5A63259"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.17763.7136",
|
||||
"matchCriteriaId": "D2941A94-927C-4393-B2A0-4630F03B8B3A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "A44CFF42-6210-4ACF-B3AC-73297E9316AC"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26637",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-26639",
|
||||
"sourceIdentifier": "secure@microsoft.com",
|
||||
"published": "2025-04-08T18:15:47.657",
|
||||
"lastModified": "2025-04-09T20:03:01.577",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"lastModified": "2025-07-03T12:49:59.027",
|
||||
"vulnStatus": "Analyzed",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
@ -55,10 +55,91 @@
|
||||
]
|
||||
}
|
||||
],
|
||||
"configurations": [
|
||||
{
|
||||
"nodes": [
|
||||
{
|
||||
"operator": "OR",
|
||||
"negate": false,
|
||||
"cpeMatch": [
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19044.5737",
|
||||
"matchCriteriaId": "2ACCA6F4-C140-4B2E-93FF-1B9DC093E831"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.19045.5737",
|
||||
"matchCriteriaId": "09E0970D-79B9-40D9-BFFF-25EE5A686B04"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "350A5C83-A85B-4CC1-81C6-F36C1BE0687E"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22621.5189",
|
||||
"matchCriteriaId": "AAB1352F-725F-427E-A3F3-73A48287D0C7"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "0A9C8BFA-DC5B-4E27-AEA1-0CF52B4FDF88"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.22631.5189",
|
||||
"matchCriteriaId": "1718BEDA-0AF8-4A6D-B053-AE746C7617C8"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:arm64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "39A448D0-EB9F-42FE-85A2-A4AA88D4CEBD"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_11_24h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "8B1600DE-F4B9-456C-A42F-5E5CDB2D6DEF"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022:*:*:*:*:*:*:*:*",
|
||||
"versionEndExcluding": "10.0.20348.3453",
|
||||
"matchCriteriaId": "52706BEC-E3D6-4188-BB88-7078FE4AF970"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.25398.1551",
|
||||
"matchCriteriaId": "0B42570D-5CFB-4620-8B06-B5752212709A"
|
||||
},
|
||||
{
|
||||
"vulnerable": true,
|
||||
"criteria": "cpe:2.3:o:microsoft:windows_server_2025:*:*:*:*:*:*:x64:*",
|
||||
"versionEndExcluding": "10.0.26100.3775",
|
||||
"matchCriteriaId": "AA03AE1F-F78C-4864-A1B6-15846AAD4899"
|
||||
}
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-26639",
|
||||
"source": "secure@microsoft.com"
|
||||
"source": "secure@microsoft.com",
|
||||
"tags": [
|
||||
"Vendor Advisory"
|
||||
]
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27447.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27447.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27447",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.407",
|
||||
"lastModified": "2025-07-03T12:15:22.407",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web application is susceptible to cross-site-scripting attacks. An attacker can create a prepared URL, which injects JavaScript code into the website. The code is executed in the victim\u00e2\u20ac\u2122s browser when an authenticated administrator clicks the link."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 7.4,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27448.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27448.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27448",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.547",
|
||||
"lastModified": "2025-07-03T12:15:22.547",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboards can inject JavaScript code into the dashboard name which will be executed when the website is loaded."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
|
||||
"baseScore": 6.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 4.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27449.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27449.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27449",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.687",
|
||||
"lastModified": "2025-07-03T12:15:22.687",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The MEAC300-FNADE4 does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27450.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27450.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27450",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.817",
|
||||
"lastModified": "2025-07-03T12:15:22.817",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The Secure attribute is missing on multiple cookies provided by the MEAC300-FNADE4. An attacker can trick a user to establish an unencrypted HTTP connection to the server and intercept the request containing the PHPSESSID cookie."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-614"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27451.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27451.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27451",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:22.960",
|
||||
"lastModified": "2025-07-03T12:15:22.960",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-204"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27452.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27452.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27452",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.100",
|
||||
"lastModified": "2025-07-03T12:15:23.100",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The configuration of the Apache httpd webserver which serves the MEAC300-FNADE4 web application, is partly insecure. There are modules activated that are not required for the operation of the FNADE4 web application. The functionality of the some modules \n\npose a risk to the webserver which enable dircetory listing."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-548"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27453.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27453.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27453",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.240",
|
||||
"lastModified": "2025-07-03T12:15:23.240",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The HttpOnly flag is set to false on the PHPSESSION cookie. Therefore, the cookie can be accessed by other sources such as JavaScript."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 5.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "HIGH",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 1.6,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1004"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27454.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27454.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27454",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.380",
|
||||
"lastModified": "2025-07-03T12:15:23.380",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The application is vulnerable to cross-site request forgery. An attacker can trick a valid, logged in user into submitting a web request that they did not intend. The request uses the victim's browser's saved authorization to execute the request."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-352"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27455.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27455.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27455",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.520",
|
||||
"lastModified": "2025-07-03T12:15:23.520",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives, thus potentially revealing confidential information or allowing others to take control of their computer while clicking on seemingly innocuous objects."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||||
"baseScore": 4.3,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-1021"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27456.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27456.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27456",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.660",
|
||||
"lastModified": "2025-07-03T12:15:23.660",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The SMB server's login mechanism does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 7.5,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-307"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27457.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27457.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27457",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.790",
|
||||
"lastModified": "2025-07-03T12:15:23.790",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "All communication between the VNC server and client(s) is unencrypted. This allows an attacker to intercept the traffic and obtain sensitive data."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-319"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27458.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27458.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27458",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:23.917",
|
||||
"lastModified": "2025-07-03T12:15:23.917",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The VNC authentication mechanism bases on a challenge-response system where both server and client use the same password for encryption. The challenge is sent from the server to the client, is encrypted by the client and sent back. The server does the same encryption locally and if the responses match it is prooven that the client knows the correct password. Since all VNC communication is unencrypted, an attacker can obtain the challenge and response and try to derive the password from this information."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-327"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27459.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27459.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27459",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:24.053",
|
||||
"lastModified": "2025-07-03T12:15:24.053",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The VNC application stores its passwords encrypted within the registry but uses DES for encryption. As DES is broken, the original passwords can be recovered."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
|
||||
"baseScore": 4.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "LOCAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 0.8,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-257"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27460.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27460.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27460",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:24.203",
|
||||
"lastModified": "2025-07-03T12:15:24.203",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The hard drives of the device are not encrypted using a full volume encryption feature such as BitLocker. This allows an attacker with physical access to the device to use an alternative operating system to interact with the hard drives, completely circumventing the Windows login. The attacker can read from and write to all files on the hard drives."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-312"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
80
CVE-2025/CVE-2025-274xx/CVE-2025-27461.json
Normal file
80
CVE-2025/CVE-2025-274xx/CVE-2025-27461.json
Normal file
@ -0,0 +1,80 @@
|
||||
{
|
||||
"id": "CVE-2025-27461",
|
||||
"sourceIdentifier": "psirt@sick.de",
|
||||
"published": "2025-07-03T12:15:24.350",
|
||||
"lastModified": "2025-07-03T12:15:24.350",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "During startup, the device automatically logs in the EPC2 Windows user without requesting a password."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
|
||||
"baseScore": 7.6,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "PHYSICAL",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 0.9,
|
||||
"impactScore": 6.0
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "psirt@sick.de",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://sick.com/psirt",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.endress.com",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.first.org/cvss/calculator/3.1",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
|
||||
"source": "psirt@sick.de"
|
||||
},
|
||||
{
|
||||
"url": "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
|
||||
"source": "psirt@sick.de"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-29xx/CVE-2025-2932.json
Normal file
60
CVE-2025/CVE-2025-29xx/CVE-2025-2932.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-2932",
|
||||
"sourceIdentifier": "security@wordfence.com",
|
||||
"published": "2025-07-03T13:15:28.220",
|
||||
"lastModified": "2025-07-03T13:15:28.220",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "The JKDEVKIT plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the 'font_upload_handler' function in all versions up to, and including, 1.9.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). If WooCommerce is enabled, attackers will need Contributor-level access and above."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||||
"baseScore": 8.8,
|
||||
"baseSeverity": "HIGH",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "HIGH",
|
||||
"integrityImpact": "HIGH",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 5.9
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security@wordfence.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-22"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "http://example.com/wp-content/plugins/jkdevkit/inc/modules/fonts_manager.php#L1710",
|
||||
"source": "security@wordfence.com"
|
||||
},
|
||||
{
|
||||
"url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/68679ff9-48a8-4146-a37f-5f844dc86c92?source=cve",
|
||||
"source": "security@wordfence.com"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-37xx/CVE-2025-3702.json
Normal file
56
CVE-2025/CVE-2025-37xx/CVE-2025-3702.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-3702",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-07-03T13:15:28.387",
|
||||
"lastModified": "2025-07-03T13:15:28.387",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Missing Authorization vulnerability in Melapress Melapress File Monitor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Melapress File Monitor: from n/a before 2.2.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
|
||||
"baseScore": 5.4,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.8,
|
||||
"impactScore": 2.5
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-862"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/website-file-changes-monitor/vulnerability/wordpress-melapress-file-monitor-plugin-2-2-0-broken-access-control-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,13 +2,13 @@
|
||||
"id": "CVE-2025-39499",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-05-23T13:15:31.360",
|
||||
"lastModified": "2025-05-23T15:54:42.643",
|
||||
"lastModified": "2025-07-03T12:15:24.660",
|
||||
"vulnStatus": "Awaiting Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Deserialization of Untrusted Data vulnerability in BoldThemes Medicare allows Object Injection. This issue affects Medicare: from n/a through 2.1.0."
|
||||
"value": "Deserialization of Untrusted Data vulnerability in BoldThemes Medicare allows Object Injection.This issue affects Medicare: from n/a through 2.1.0."
|
||||
},
|
||||
{
|
||||
"lang": "es",
|
||||
@ -42,7 +42,7 @@
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
|
78
CVE-2025/CVE-2025-407xx/CVE-2025-40722.json
Normal file
78
CVE-2025/CVE-2025-407xx/CVE-2025-40722.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40722",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-07-03T12:15:24.777",
|
||||
"lastModified": "2025-07-03T12:15:24.777",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored Cross-Site Scripting (XSS) vulnerability in versions prior to Flatboard 3.2.2 of Flatboard Pro, consisting of a stored XSS due to lack of proper validation of user input, through the\u00a0replace parameter in /config.php/tags."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-stored-cross-site-scripting-xss-vulnerabilities-flatboard-pro",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
78
CVE-2025/CVE-2025-407xx/CVE-2025-40723.json
Normal file
78
CVE-2025/CVE-2025-407xx/CVE-2025-40723.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-40723",
|
||||
"sourceIdentifier": "cve-coordination@incibe.es",
|
||||
"published": "2025-07-03T12:15:24.933",
|
||||
"lastModified": "2025-07-03T12:15:24.933",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Stored Cross-Site Scripting (XSS) vulnerability in versions prior to Flatboard 3.2.2 of Flatboard Pro, consisting of a stored XSS due to lack of proper validation of user input, through the\u00a0footer_text and announcement parameters in config.php."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 5.1,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "PASSIVE",
|
||||
"vulnConfidentialityImpact": "NONE",
|
||||
"vulnIntegrityImpact": "NONE",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "LOW",
|
||||
"subIntegrityImpact": "LOW",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve-coordination@incibe.es",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-stored-cross-site-scripting-xss-vulnerabilities-flatboard-pro",
|
||||
"source": "cve-coordination@incibe.es"
|
||||
}
|
||||
]
|
||||
}
|
56
CVE-2025/CVE-2025-490xx/CVE-2025-49032.json
Normal file
56
CVE-2025/CVE-2025-490xx/CVE-2025-49032.json
Normal file
@ -0,0 +1,56 @@
|
||||
{
|
||||
"id": "CVE-2025-49032",
|
||||
"sourceIdentifier": "audit@patchstack.com",
|
||||
"published": "2025-07-03T13:15:28.540",
|
||||
"lastModified": "2025-07-03T13:15:28.540",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PublishPress Gutenberg Blocks allows Stored XSS.This issue affects Gutenberg Blocks: from n/a through 3.3.1."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L",
|
||||
"baseScore": 6.5,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "LOW",
|
||||
"userInteraction": "REQUIRED",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "LOW",
|
||||
"availabilityImpact": "LOW"
|
||||
},
|
||||
"exploitabilityScore": 2.3,
|
||||
"impactScore": 3.7
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "audit@patchstack.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-79"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://patchstack.com/database/wordpress/plugin/advanced-gutenberg/vulnerability/wordpress-gutenberg-blocks-plugin-3-3-1-cross-site-scripting-xss-vulnerability?_s_id=cve",
|
||||
"source": "audit@patchstack.com"
|
||||
}
|
||||
]
|
||||
}
|
64
CVE-2025/CVE-2025-495xx/CVE-2025-49595.json
Normal file
64
CVE-2025/CVE-2025-495xx/CVE-2025-49595.json
Normal file
@ -0,0 +1,64 @@
|
||||
{
|
||||
"id": "CVE-2025-49595",
|
||||
"sourceIdentifier": "security-advisories@github.com",
|
||||
"published": "2025-07-03T13:15:28.690",
|
||||
"lastModified": "2025-07-03T13:15:28.690",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or filesystem-v2://). This allows authenticated attackers to cause service unavailability through malformed filesystem URI requests, effecting the /rest/binary-data endpoint and n8n.cloud instances (confirmed HTTP/2 524 timeout responses). Attackers can exploit this by sending GET requests with empty filesystem URIs (filesystem:// or filesystem-v2://) to the /rest/binary-data endpoint, causing resource exhaustion and service disruption. This issue has been patched in version 1.99.0."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
|
||||
"baseScore": 4.9,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "HIGH",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "UNCHANGED",
|
||||
"confidentialityImpact": "NONE",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "HIGH"
|
||||
},
|
||||
"exploitabilityScore": 1.2,
|
||||
"impactScore": 3.6
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "security-advisories@github.com",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-400"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/commit/43c52a8b4f844e91b02e3cc9df92826a2d7b6052",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/pull/16229",
|
||||
"source": "security-advisories@github.com"
|
||||
},
|
||||
{
|
||||
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-pr9r-gxgp-9rm8",
|
||||
"source": "security-advisories@github.com"
|
||||
}
|
||||
]
|
||||
}
|
60
CVE-2025/CVE-2025-496xx/CVE-2025-49618.json
Normal file
60
CVE-2025/CVE-2025-496xx/CVE-2025-49618.json
Normal file
@ -0,0 +1,60 @@
|
||||
{
|
||||
"id": "CVE-2025-49618",
|
||||
"sourceIdentifier": "cve@mitre.org",
|
||||
"published": "2025-07-03T13:15:28.860",
|
||||
"lastModified": "2025-07-03T13:15:28.860",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "In Plesk Obsidian 18.0.69, unauthenticated requests to /login_up.php can reveal an AWS accessKeyId, secretAccessKey, region, and endpoint."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV31": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "3.1",
|
||||
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N",
|
||||
"baseScore": 5.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "NETWORK",
|
||||
"attackComplexity": "LOW",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "NONE",
|
||||
"scope": "CHANGED",
|
||||
"confidentialityImpact": "LOW",
|
||||
"integrityImpact": "NONE",
|
||||
"availabilityImpact": "NONE"
|
||||
},
|
||||
"exploitabilityScore": 3.9,
|
||||
"impactScore": 1.4
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "cve@mitre.org",
|
||||
"type": "Primary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-402"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.linkedin.com/posts/gaetano-cesano-976420200_qualche-giorno-fa-stavo-testando-plesk-obsidian-activity-7341794923198709761-by9G",
|
||||
"source": "cve@mitre.org"
|
||||
},
|
||||
{
|
||||
"url": "https://www.plesk.com/blog/plesk-news-announcements/plesk-obsidian-18-0-69-is-here/",
|
||||
"source": "cve@mitre.org"
|
||||
}
|
||||
]
|
||||
}
|
@ -2,8 +2,8 @@
|
||||
"id": "CVE-2025-6554",
|
||||
"sourceIdentifier": "chrome-cve-admin@google.com",
|
||||
"published": "2025-06-30T22:15:29.873",
|
||||
"lastModified": "2025-07-03T01:00:02.480",
|
||||
"vulnStatus": "Received",
|
||||
"lastModified": "2025-07-03T13:37:28.153",
|
||||
"vulnStatus": "Undergoing Analysis",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
|
78
CVE-2025/CVE-2025-65xx/CVE-2025-6563.json
Normal file
78
CVE-2025/CVE-2025-65xx/CVE-2025-6563.json
Normal file
@ -0,0 +1,78 @@
|
||||
{
|
||||
"id": "CVE-2025-6563",
|
||||
"sourceIdentifier": "1c6b5737-9389-4011-8117-89fa251edfb2",
|
||||
"published": "2025-07-03T12:15:25.077",
|
||||
"lastModified": "2025-07-03T12:15:25.077",
|
||||
"vulnStatus": "Received",
|
||||
"cveTags": [],
|
||||
"descriptions": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "A cross-site scripting vulnerability is present in the hotspot of MikroTik's RouterOS on versions below 7.19.2. An attacker can inject the `javascript` protocol in the `dst` parameter. When the victim browses to the malicious URL and logs in, the XSS executes. The POST request used to login, can also be converted to a GET request, allowing an attacker to send a specifically crafted URL that automatically logs in the victim (into the attacker's account) and triggers the payload."
|
||||
}
|
||||
],
|
||||
"metrics": {
|
||||
"cvssMetricV40": [
|
||||
{
|
||||
"source": "1c6b5737-9389-4011-8117-89fa251edfb2",
|
||||
"type": "Secondary",
|
||||
"cvssData": {
|
||||
"version": "4.0",
|
||||
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
|
||||
"baseScore": 4.8,
|
||||
"baseSeverity": "MEDIUM",
|
||||
"attackVector": "ADJACENT",
|
||||
"attackComplexity": "LOW",
|
||||
"attackRequirements": "NONE",
|
||||
"privilegesRequired": "NONE",
|
||||
"userInteraction": "ACTIVE",
|
||||
"vulnConfidentialityImpact": "LOW",
|
||||
"vulnIntegrityImpact": "LOW",
|
||||
"vulnAvailabilityImpact": "NONE",
|
||||
"subConfidentialityImpact": "NONE",
|
||||
"subIntegrityImpact": "NONE",
|
||||
"subAvailabilityImpact": "NONE",
|
||||
"exploitMaturity": "NOT_DEFINED",
|
||||
"confidentialityRequirement": "NOT_DEFINED",
|
||||
"integrityRequirement": "NOT_DEFINED",
|
||||
"availabilityRequirement": "NOT_DEFINED",
|
||||
"modifiedAttackVector": "NOT_DEFINED",
|
||||
"modifiedAttackComplexity": "NOT_DEFINED",
|
||||
"modifiedAttackRequirements": "NOT_DEFINED",
|
||||
"modifiedPrivilegesRequired": "NOT_DEFINED",
|
||||
"modifiedUserInteraction": "NOT_DEFINED",
|
||||
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
|
||||
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
|
||||
"modifiedSubIntegrityImpact": "NOT_DEFINED",
|
||||
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
|
||||
"Safety": "NOT_DEFINED",
|
||||
"Automatable": "NOT_DEFINED",
|
||||
"Recovery": "NOT_DEFINED",
|
||||
"valueDensity": "NOT_DEFINED",
|
||||
"vulnerabilityResponseEffort": "NOT_DEFINED",
|
||||
"providerUrgency": "NOT_DEFINED"
|
||||
}
|
||||
}
|
||||
]
|
||||
},
|
||||
"weaknesses": [
|
||||
{
|
||||
"source": "1c6b5737-9389-4011-8117-89fa251edfb2",
|
||||
"type": "Secondary",
|
||||
"description": [
|
||||
{
|
||||
"lang": "en",
|
||||
"value": "CWE-20"
|
||||
}
|
||||
]
|
||||
}
|
||||
],
|
||||
"references": [
|
||||
{
|
||||
"url": "https://www.toreon.com/how-a-ski-trip-led-to-a-cve-in-a-wi-fi-hotspot/",
|
||||
"source": "1c6b5737-9389-4011-8117-89fa251edfb2"
|
||||
}
|
||||
]
|
||||
}
|
68
README.md
68
README.md
@ -13,13 +13,13 @@ Repository synchronizes with the NVD every 2 hours.
|
||||
### Last Repository Update
|
||||
|
||||
```plain
|
||||
2025-07-03T12:00:11.373690+00:00
|
||||
2025-07-03T14:00:13.368046+00:00
|
||||
```
|
||||
|
||||
### Most recent CVE Modification Timestamp synchronized with NVD
|
||||
|
||||
```plain
|
||||
2025-07-03T11:58:29.933000+00:00
|
||||
2025-07-03T13:54:34.513000+00:00
|
||||
```
|
||||
|
||||
### Last Data Feed Release
|
||||
@ -33,27 +33,69 @@ Download and Changelog: [Click](https://github.com/fkie-cad/nvd-json-data-feeds/
|
||||
### Total Number of included CVEs
|
||||
|
||||
```plain
|
||||
300186
|
||||
300215
|
||||
```
|
||||
|
||||
### CVEs added in the last Commit
|
||||
|
||||
Recently added CVEs: `3`
|
||||
Recently added CVEs: `29`
|
||||
|
||||
- [CVE-2024-5647](CVE-2024/CVE-2024-56xx/CVE-2024-5647.json) (`2025-07-03T10:15:34.527`)
|
||||
- [CVE-2025-0885](CVE-2025/CVE-2025-08xx/CVE-2025-0885.json) (`2025-07-03T10:15:36.583`)
|
||||
- [CVE-2025-6587](CVE-2025/CVE-2025-65xx/CVE-2025-6587.json) (`2025-07-03T10:15:37.773`)
|
||||
- [CVE-2025-2537](CVE-2025/CVE-2025-25xx/CVE-2025-2537.json) (`2025-07-03T13:15:27.337`)
|
||||
- [CVE-2025-2540](CVE-2025/CVE-2025-25xx/CVE-2025-2540.json) (`2025-07-03T12:15:24.483`)
|
||||
- [CVE-2025-27447](CVE-2025/CVE-2025-274xx/CVE-2025-27447.json) (`2025-07-03T12:15:22.407`)
|
||||
- [CVE-2025-27448](CVE-2025/CVE-2025-274xx/CVE-2025-27448.json) (`2025-07-03T12:15:22.547`)
|
||||
- [CVE-2025-27449](CVE-2025/CVE-2025-274xx/CVE-2025-27449.json) (`2025-07-03T12:15:22.687`)
|
||||
- [CVE-2025-27450](CVE-2025/CVE-2025-274xx/CVE-2025-27450.json) (`2025-07-03T12:15:22.817`)
|
||||
- [CVE-2025-27451](CVE-2025/CVE-2025-274xx/CVE-2025-27451.json) (`2025-07-03T12:15:22.960`)
|
||||
- [CVE-2025-27452](CVE-2025/CVE-2025-274xx/CVE-2025-27452.json) (`2025-07-03T12:15:23.100`)
|
||||
- [CVE-2025-27453](CVE-2025/CVE-2025-274xx/CVE-2025-27453.json) (`2025-07-03T12:15:23.240`)
|
||||
- [CVE-2025-27454](CVE-2025/CVE-2025-274xx/CVE-2025-27454.json) (`2025-07-03T12:15:23.380`)
|
||||
- [CVE-2025-27455](CVE-2025/CVE-2025-274xx/CVE-2025-27455.json) (`2025-07-03T12:15:23.520`)
|
||||
- [CVE-2025-27456](CVE-2025/CVE-2025-274xx/CVE-2025-27456.json) (`2025-07-03T12:15:23.660`)
|
||||
- [CVE-2025-27457](CVE-2025/CVE-2025-274xx/CVE-2025-27457.json) (`2025-07-03T12:15:23.790`)
|
||||
- [CVE-2025-27458](CVE-2025/CVE-2025-274xx/CVE-2025-27458.json) (`2025-07-03T12:15:23.917`)
|
||||
- [CVE-2025-27459](CVE-2025/CVE-2025-274xx/CVE-2025-27459.json) (`2025-07-03T12:15:24.053`)
|
||||
- [CVE-2025-27460](CVE-2025/CVE-2025-274xx/CVE-2025-27460.json) (`2025-07-03T12:15:24.203`)
|
||||
- [CVE-2025-27461](CVE-2025/CVE-2025-274xx/CVE-2025-27461.json) (`2025-07-03T12:15:24.350`)
|
||||
- [CVE-2025-2932](CVE-2025/CVE-2025-29xx/CVE-2025-2932.json) (`2025-07-03T13:15:28.220`)
|
||||
- [CVE-2025-3702](CVE-2025/CVE-2025-37xx/CVE-2025-3702.json) (`2025-07-03T13:15:28.387`)
|
||||
- [CVE-2025-40722](CVE-2025/CVE-2025-407xx/CVE-2025-40722.json) (`2025-07-03T12:15:24.777`)
|
||||
- [CVE-2025-40723](CVE-2025/CVE-2025-407xx/CVE-2025-40723.json) (`2025-07-03T12:15:24.933`)
|
||||
- [CVE-2025-49032](CVE-2025/CVE-2025-490xx/CVE-2025-49032.json) (`2025-07-03T13:15:28.540`)
|
||||
- [CVE-2025-49595](CVE-2025/CVE-2025-495xx/CVE-2025-49595.json) (`2025-07-03T13:15:28.690`)
|
||||
- [CVE-2025-49618](CVE-2025/CVE-2025-496xx/CVE-2025-49618.json) (`2025-07-03T13:15:28.860`)
|
||||
- [CVE-2025-6563](CVE-2025/CVE-2025-65xx/CVE-2025-6563.json) (`2025-07-03T12:15:25.077`)
|
||||
|
||||
|
||||
### CVEs modified in the last Commit
|
||||
|
||||
Recently modified CVEs: `5`
|
||||
Recently modified CVEs: `25`
|
||||
|
||||
- [CVE-2024-34198](CVE-2024/CVE-2024-341xx/CVE-2024-34198.json) (`2025-07-03T11:58:29.933`)
|
||||
- [CVE-2025-21399](CVE-2025/CVE-2025-213xx/CVE-2025-21399.json) (`2025-07-03T11:22:24.480`)
|
||||
- [CVE-2025-47558](CVE-2025/CVE-2025-475xx/CVE-2025-47558.json) (`2025-07-03T10:15:37.073`)
|
||||
- [CVE-2025-47560](CVE-2025/CVE-2025-475xx/CVE-2025-47560.json) (`2025-07-03T10:15:37.290`)
|
||||
- [CVE-2025-47561](CVE-2025/CVE-2025-475xx/CVE-2025-47561.json) (`2025-07-03T10:15:37.560`)
|
||||
- [CVE-2023-37229](CVE-2023/CVE-2023-372xx/CVE-2023-37229.json) (`2025-07-03T12:16:01.333`)
|
||||
- [CVE-2024-41435](CVE-2024/CVE-2024-414xx/CVE-2024-41435.json) (`2025-07-03T12:52:19.633`)
|
||||
- [CVE-2024-41436](CVE-2024/CVE-2024-414xx/CVE-2024-41436.json) (`2025-07-03T12:51:14.427`)
|
||||
- [CVE-2024-42759](CVE-2024/CVE-2024-427xx/CVE-2024-42759.json) (`2025-07-03T12:24:25.260`)
|
||||
- [CVE-2024-42885](CVE-2024/CVE-2024-428xx/CVE-2024-42885.json) (`2025-07-03T12:43:25.490`)
|
||||
- [CVE-2024-42901](CVE-2024/CVE-2024-429xx/CVE-2024-42901.json) (`2025-07-03T13:04:06.263`)
|
||||
- [CVE-2024-42902](CVE-2024/CVE-2024-429xx/CVE-2024-42902.json) (`2025-07-03T12:59:01.233`)
|
||||
- [CVE-2024-44085](CVE-2024/CVE-2024-440xx/CVE-2024-44085.json) (`2025-07-03T12:20:51.480`)
|
||||
- [CVE-2024-45919](CVE-2024/CVE-2024-459xx/CVE-2024-45919.json) (`2025-07-03T13:48:58.623`)
|
||||
- [CVE-2024-46486](CVE-2024/CVE-2024-464xx/CVE-2024-46486.json) (`2025-07-03T13:52:36.520`)
|
||||
- [CVE-2024-46535](CVE-2024/CVE-2024-465xx/CVE-2024-46535.json) (`2025-07-03T13:11:38.520`)
|
||||
- [CVE-2024-6971](CVE-2024/CVE-2024-69xx/CVE-2024-6971.json) (`2025-07-03T13:39:58.133`)
|
||||
- [CVE-2025-21222](CVE-2025/CVE-2025-212xx/CVE-2025-21222.json) (`2025-07-03T13:17:51.020`)
|
||||
- [CVE-2025-21247](CVE-2025/CVE-2025-212xx/CVE-2025-21247.json) (`2025-07-03T13:41:26.107`)
|
||||
- [CVE-2025-24035](CVE-2025/CVE-2025-240xx/CVE-2025-24035.json) (`2025-07-03T13:54:34.513`)
|
||||
- [CVE-2025-24060](CVE-2025/CVE-2025-240xx/CVE-2025-24060.json) (`2025-07-03T13:09:11.443`)
|
||||
- [CVE-2025-24062](CVE-2025/CVE-2025-240xx/CVE-2025-24062.json) (`2025-07-03T13:07:14.593`)
|
||||
- [CVE-2025-24071](CVE-2025/CVE-2025-240xx/CVE-2025-24071.json) (`2025-07-03T13:23:25.997`)
|
||||
- [CVE-2025-24073](CVE-2025/CVE-2025-240xx/CVE-2025-24073.json) (`2025-07-03T13:04:30.673`)
|
||||
- [CVE-2025-24074](CVE-2025/CVE-2025-240xx/CVE-2025-24074.json) (`2025-07-03T13:03:00.923`)
|
||||
- [CVE-2025-26635](CVE-2025/CVE-2025-266xx/CVE-2025-26635.json) (`2025-07-03T13:00:05.107`)
|
||||
- [CVE-2025-26637](CVE-2025/CVE-2025-266xx/CVE-2025-26637.json) (`2025-07-03T13:03:14.377`)
|
||||
- [CVE-2025-26639](CVE-2025/CVE-2025-266xx/CVE-2025-26639.json) (`2025-07-03T12:49:59.027`)
|
||||
- [CVE-2025-39499](CVE-2025/CVE-2025-394xx/CVE-2025-39499.json) (`2025-07-03T12:15:24.660`)
|
||||
- [CVE-2025-6554](CVE-2025/CVE-2025-65xx/CVE-2025-6554.json) (`2025-07-03T13:37:28.153`)
|
||||
|
||||
|
||||
## Download and Usage
|
||||
|
95
_state.csv
95
_state.csv
@ -230429,7 +230429,7 @@ CVE-2023-37225,0,0,8e86ef40cf3080e5b75edfaa20e235c214c1d5427bd69b4c34124be426b2a
|
||||
CVE-2023-37226,0,0,90c39b95f6c582b388aa321b4758b1308db4eb039a23d99d5a8fb7f9ed9f2065,2025-05-29T16:28:20.207000
|
||||
CVE-2023-37227,0,0,918fd56bbe1be7c8d5411cde0b91a3fe71a9f71d8bafcbe2097ce6223cac2ec1,2025-05-29T16:28:09.540000
|
||||
CVE-2023-37228,0,0,643ba6d022c49330496a6c23ea43a1b4794516f1d1a88ce155ebc80364021378,2024-08-15T16:15:16.890000
|
||||
CVE-2023-37229,0,0,498afd0f99373db375f4fd811013bb9dabea9619dd1bada9470a9b6ee5d56782,2024-09-10T17:35:05.483000
|
||||
CVE-2023-37229,0,1,137d8be82847bcd2ad49442a6ef79cddd11077e12cb032be98317b1c37e489b8,2025-07-03T12:16:01.333000
|
||||
CVE-2023-37230,0,0,af63d27e31aecb17ce8b868c317782a2fc2b669d7413451e387e569af4f2bb0d,2024-09-10T17:35:06.247000
|
||||
CVE-2023-37231,0,0,ea38d61c2a526e918322f8955bd737d85864060fcc306d98000810f96279584e,2025-05-29T16:27:55.603000
|
||||
CVE-2023-37232,0,0,90165ef3c795e221db3e1c3df615a8c88e6e7ed19a8ed12ce46591b7ef66e273,2024-09-18T15:55:43.113000
|
||||
@ -261139,7 +261139,7 @@ CVE-2024-34191,0,0,e746afd9a92f9dff6e4ada85c106d8b00b6270936c8e514e831f73fb24a6a
|
||||
CVE-2024-34193,0,0,8446fc40425660bbb6c8faef1d786a3a74e2e9b3c7e39f75ac6bb75d99f360f8,2024-11-21T09:18:14.267000
|
||||
CVE-2024-34195,0,0,7b2b923be1f39c81e8f2094bddad2be6ed9b0bc12f72616acced47e2f24d4bcf,2024-08-30T15:59:08.873000
|
||||
CVE-2024-34196,0,0,0f442bd37518785c9bb7577df1af92e8bd7510ce7d0ea82090fc33cc45728049,2025-06-18T14:30:01.220000
|
||||
CVE-2024-34198,0,1,4710c54a02baaa6f8cd22997fa1afc2c53d8ed3f38640033289cd81482bc8f8f,2025-07-03T11:58:29.933000
|
||||
CVE-2024-34198,0,0,4710c54a02baaa6f8cd22997fa1afc2c53d8ed3f38640033289cd81482bc8f8f,2025-07-03T11:58:29.933000
|
||||
CVE-2024-34199,0,0,db35ed4824a4c7979ec877b53b2cea3df3043a4588781cd51d13a1deabe17489,2025-06-13T13:12:37.470000
|
||||
CVE-2024-3420,0,0,efec06cd5f4d144c492dbb970109a761cdf434a81bcd477f32ec62ac52a1b8e9,2025-01-17T15:24:53.263000
|
||||
CVE-2024-34200,0,0,d97afafa9879daf97cdbab3b5d89206afc4b3f8cdd9eae44d77537598cecf2b6,2025-04-03T16:39:33.180000
|
||||
@ -266787,8 +266787,8 @@ CVE-2024-4143,0,0,358908d0b0c6e0648fc8a9c90fd71c7a7449d67ffd1159ca639b75ffacefbf
|
||||
CVE-2024-41432,0,0,7825a40ec5fbf977251be015af2234a488bf74ef67cbf12c2260f10afd65a2e9,2024-08-08T15:02:52.647000
|
||||
CVE-2024-41433,0,0,2f76b8aacc91eba3b5ff1863fbad6f7bc7e876a4a2802b9c675b97e88ee8398d,2024-09-25T21:15:03.210000
|
||||
CVE-2024-41434,0,0,b6b54028988d97f64aedf6249437d9b5db9937e462242576baab31d9b3d312f5,2024-09-25T21:15:03.367000
|
||||
CVE-2024-41435,0,0,d0bc8ec0a7af1604494bac71fb23649cf0a585c6b18e26ddf1a177ee6d9a2233,2024-09-03T21:35:10.947000
|
||||
CVE-2024-41436,0,0,25d147142847d611ae348f50524ca290b79b915bf8c3e85e5a3fe66154ec0b63,2024-09-03T20:35:15.853000
|
||||
CVE-2024-41435,0,1,09464c9184df084b2ea7d37ff372a39b9c563dfba09e216ea15afa7d5cd99aa8,2025-07-03T12:52:19.633000
|
||||
CVE-2024-41436,0,1,60b582ba063fadc86392955a0dfd2db75a9489a67ac97dfdfd50f4871d7dfa9a,2025-07-03T12:51:14.427000
|
||||
CVE-2024-41437,0,0,8050b05163f545dad66b427b509d1ada0ab12a4c8b48800dc916e5a42396be4e,2025-03-13T19:15:47.043000
|
||||
CVE-2024-41438,0,0,3c4849370a7ae986a8fc2dc41278fe26a6563e2397b116c7e80eb07d3632cc3b,2024-11-21T09:32:39.453000
|
||||
CVE-2024-41439,0,0,4a057fb4cd0d4bbf1499d510ad879729f6e1fb2b8c5cd6390ca151c9f88e8edc,2024-11-21T09:32:39.667000
|
||||
@ -267875,7 +267875,7 @@ CVE-2024-4275,0,0,d2f322e42af6ec3476faf0dd36fe741047bef38d9a28a7244e4e4966f6ea5f
|
||||
CVE-2024-42756,0,0,c297a98c83690879b16b35b554c1718c0679dfdbdea17176babcbd84518f2e5c,2024-08-27T15:35:17.887000
|
||||
CVE-2024-42757,0,0,6032327ba14ad6a7637331b6efb33482e59f2f43c1433ef362e51680e15d2811,2024-08-20T15:35:25.190000
|
||||
CVE-2024-42758,0,0,a85749caa27b5e91a3099722c781dc5af033562f8713a324f6d350c0157c0314,2024-08-19T18:35:14.237000
|
||||
CVE-2024-42759,0,0,d82e51b21dc23ee284d43fa8f92554120d3d62ffb307f0bc8dcd084dbbd9f9af,2024-09-10T16:35:05.400000
|
||||
CVE-2024-42759,0,1,90f04ebcdee7eeaeebf98cbb9577334d189cd097e2c03f52f25a959f1b6ed150,2025-07-03T12:24:25.260000
|
||||
CVE-2024-4276,0,0,b324f37f8cc341d807572ba3faf76119e593b3fa41bfbec3b1b8156b451236b7,2025-02-11T02:15:34.983000
|
||||
CVE-2024-42760,0,0,9417ffb321428c8b3b8fb2f42f84eb9cde7dd4e38dbec3cb6b75e002d94a99d3,2024-09-12T16:35:07.910000
|
||||
CVE-2024-42761,0,0,edd853a047faad0c46d33cd5ef4558f1676ac5a7dce8c45d9f9bcc65d9210303,2025-05-06T13:48:01.547000
|
||||
@ -267944,13 +267944,13 @@ CVE-2024-4286,0,0,fc10432f74acfd23bc16db5ad2ae8d1fb5ffa13fb0db5216eff98611dc6693
|
||||
CVE-2024-42861,0,0,5ac4827af3e3142d1b282b5930c3cc4ee3777c4ff3aba0df8482c0899ef1a430,2025-03-18T16:15:23.257000
|
||||
CVE-2024-4287,0,0,b8a2cf136b3083f6bb500806e5afada31dbc16efa97357879361c58428559568,2024-11-21T09:42:32.727000
|
||||
CVE-2024-4288,0,0,c3337da044993bbbc180fcf8a19f1690cecb1ffe7d7876ad254d73c7461b14d3,2025-01-28T16:28:47.287000
|
||||
CVE-2024-42885,0,0,ee56590959e67a72b05a6cda20f46f0a9d3647870a63123321ef2d7e471b6b35,2024-09-05T18:35:07.060000
|
||||
CVE-2024-42885,0,1,f3b09297bd7b416beed100455b3dd932846903f663f522d4410245983de66412,2025-07-03T12:43:25.490000
|
||||
CVE-2024-4289,0,0,d33b9c92eed60e51903165a7c62afac203f39d4e8044c2f1b8b95bf402211614,2025-05-21T19:01:52.173000
|
||||
CVE-2024-42898,0,0,f0a404c15dfbdd17bf8fc2fff1d0150e98b26ac04c520196b856ef45cfd1089a,2025-01-10T18:15:21.670000
|
||||
CVE-2024-4290,0,0,12d0d4e304fec6a02b4daa42f968875692080f083d2d86faf7195771fd4b72ac,2025-05-21T19:02:33.450000
|
||||
CVE-2024-42900,0,0,1563bd7f3a6ebbfaf9600291cd027aeaf69d7943db05ad35a615fb99ae94c3a0,2025-05-14T18:25:19.803000
|
||||
CVE-2024-42901,0,0,9d4f70442012ad8f1030c7f39a3f1f96438ccca748283f1dbba48d1bb86b4254,2024-09-03T20:35:17.380000
|
||||
CVE-2024-42902,0,0,0fac7073d9b5226072961682891d802c87a0b5e15884d6f1d0130384815f4b34,2024-09-03T19:40:46.783000
|
||||
CVE-2024-42901,0,1,377101d2ed985f0a7c4377cb1e298f083f6c729350b6d807ac70c27af769a405,2025-07-03T13:04:06.263000
|
||||
CVE-2024-42902,0,1,a7718651d81f58983d9d99968380180cbcecc2e52579a5b003a92c8df4ef6bb5,2025-07-03T12:59:01.233000
|
||||
CVE-2024-42903,0,0,2f33bcfe53a750a34772d91c7f52bd89aa7da23b8effc842b0e12ed4ed0f4d03,2025-03-13T21:15:41.527000
|
||||
CVE-2024-42904,0,0,9f83344af1f87b9eadf4f14460cf282240c0a27dfed27c8b645a7cb7f3a649fe,2025-03-13T15:15:47.417000
|
||||
CVE-2024-42905,0,0,c52ab1475651d1d452452a4967b5f494474147ab5b1030ccb298ab25a52e8907,2024-08-29T13:25:27.537000
|
||||
@ -269056,7 +269056,7 @@ CVE-2024-44080,0,0,dbdc43fdecbe62d26533a789437791b2e78dfe380d424585b4199d8341046
|
||||
CVE-2024-44081,0,0,98e947bc87453398d4177d7385e310545b39f9298f98053aed9e474a1b7d768a,2024-11-21T09:36:15.807000
|
||||
CVE-2024-44082,0,0,61c562a7d2817e001d21598a5165a2692cb61ee5ff6733f860a689ff2c3a8b81,2024-11-07T08:35:04.653000
|
||||
CVE-2024-44083,0,0,480663e1fc40a902e034be45368a4a86ef2836d9054cbbaf92da35955c786bc5,2025-03-18T21:15:29.613000
|
||||
CVE-2024-44085,0,0,72510709f5b8546e822fe2fbaabf03396d601cc79d20ddfd7f25c7bf9ef45fef,2024-09-10T15:35:08.883000
|
||||
CVE-2024-44085,0,1,54ab8e26b8c087994c0b9fd45feb0050fc0218bca89b95b8c39e2f0717c4b97e,2025-07-03T12:20:51.480000
|
||||
CVE-2024-44087,0,0,76a2ac2432a1cd198fc0e61a96571045d3f7d6fc8a3cc56107e68017306a5c18,2025-05-13T10:15:20.677000
|
||||
CVE-2024-4409,0,0,bc1f0f31b03f43ef76b3b916f61ef48377f92665a3722f4ffb4a04feeaf1f7e1,2024-11-21T09:42:46.920000
|
||||
CVE-2024-44092,0,0,bbc3fa48e34639bdac522ed5de685a1e647a807068c013342b96b1584a379435,2025-01-17T23:15:12.920000
|
||||
@ -270363,7 +270363,7 @@ CVE-2024-45894,0,0,e59bdfc35a515b5f33ff41e3ab0d823c6973b3f93c825177f63b310ce83af
|
||||
CVE-2024-4590,0,0,bc09956729132e0151ecbfbab395a253093f927be6a4eabbe33e103aa3dfcba9,2025-01-15T18:54:33.470000
|
||||
CVE-2024-4591,0,0,21b9b4555675907f0fd25c34fd7f2d1fdb015e950185d11bd7c3d20893406ecb,2025-01-15T18:54:36.570000
|
||||
CVE-2024-45918,0,0,48580a666556a417453ad10009e9e6c09650ad8552887042735654a6c1d17b8c,2024-11-05T20:35:23.220000
|
||||
CVE-2024-45919,0,0,556d242983a2cdf42d2c43810929509003333fff8369d850096346be8d6454a9,2024-10-10T12:57:21.987000
|
||||
CVE-2024-45919,0,1,ca243185990a7f99232a2420752fc2a9c784740e5c2398151c09a1c65fa63f8a,2025-07-03T13:48:58.623000
|
||||
CVE-2024-4592,0,0,b2cfb82b55adfeb132b76c121841ceb616cb9b969de36aaf222147aa5d35c8a8,2025-01-15T18:54:14.917000
|
||||
CVE-2024-45920,0,0,18cd7d843e95664f36e41d61ee16ead05ded8f3803935a54c34174a6fcfb09ed,2024-10-04T13:51:25.567000
|
||||
CVE-2024-4593,0,0,fbb994a45d5967705e6adc3edf6ba0bf812b7a2290c1d236208ff34a35d23ac4,2025-01-15T18:54:03.637000
|
||||
@ -270564,7 +270564,7 @@ CVE-2024-46481,0,0,368d4913ca3abe83054053c7b25a5474cf2a690dfae1e79806cb2ba367b87
|
||||
CVE-2024-46482,0,0,e4c801a2cf34271c78e5d32f990a4d755bf1dcc521ae213f4144174e1d100bef,2024-10-23T18:35:03.670000
|
||||
CVE-2024-46483,0,0,5f5b506edb7d89b259e9e397ae75c01096f4b3cb3d63773184b27131fe14eeb5,2024-10-23T19:35:11.493000
|
||||
CVE-2024-46485,0,0,514e1eab7e9507acacc78a30f82065b0b0983330b3a25efafcb1c4c1f04e020e,2025-05-27T19:05:06.643000
|
||||
CVE-2024-46486,0,0,6000c159ec790985a8f8b0baa816aa79580e9d13b05f3014b35b7b51c8e41f43,2024-10-07T19:37:29.423000
|
||||
CVE-2024-46486,0,1,2faee0a60834fa544c0adcb8a7d600fe61bc41046103fc49ba5f717053aafd80,2025-07-03T13:52:36.520000
|
||||
CVE-2024-46488,0,0,56f5fe55fa4ef09d855ee33f04dd341373041abcc8cd41a78f126a1716041dc8,2024-10-02T16:21:36.507000
|
||||
CVE-2024-46489,0,0,8af935ea59345c18a65a02a5934ad59e5a604855494058e15126d177378cefdd,2024-10-02T16:24:32.300000
|
||||
CVE-2024-4649,0,0,f64d2b4ba0c6460a9ead3048468022c15a6a01d0faaa5bf3c36ccd0615f06803,2025-02-19T18:03:44.760000
|
||||
@ -270581,7 +270581,7 @@ CVE-2024-46528,0,0,966deb12dddebc5137dae02ab6860999c025751d4180a1ef1379e24312a6e
|
||||
CVE-2024-4653,0,0,05a0bd75448bb177be53c40d574503310d9260891386f10103a2ab1e0fb8b86d,2024-11-21T09:43:18.643000
|
||||
CVE-2024-46531,0,0,fac5ecf7745ccff6e0e71b7b770d51c18e8ff95108c8bd1f7feaeb31f5fd4df1,2025-04-04T14:35:57.957000
|
||||
CVE-2024-46532,0,0,fb99bbb875d6e467b1ed3043cedf30d6f1485897b14c4550bd7c98261c85aefd,2024-10-16T18:35:05.480000
|
||||
CVE-2024-46535,0,0,0db09cdc25f6399278d3de8427309909cfbb4f1a148fef767bc166298eca9e58,2025-03-18T15:15:54.450000
|
||||
CVE-2024-46535,0,1,f3b7c1f0dff6936111cd150474bbea02f7bddb4944037f0916bb6bd0c8295f5f,2025-07-03T13:11:38.520000
|
||||
CVE-2024-46538,0,0,36ab03c909d91ed67f1af19450c3d6e48453f6f51660df666d70bd09393db805,2024-10-30T20:45:35.240000
|
||||
CVE-2024-46539,0,0,ae91e2d70102a1f16abd97afb097daba74795893f1a3d024416684e8f573e136,2024-10-10T12:56:30.817000
|
||||
CVE-2024-4654,0,0,3ba1a7fb0c9b6d7f54909c48e7df48bad4f328f4a19665a74071d60aed80ba01,2024-11-21T09:43:18.787000
|
||||
@ -277745,7 +277745,7 @@ CVE-2024-5646,0,0,c39d61685ca6ba30db41ed6b17d56f938fdd28c5c99f1b1df8f25b64d9dcfb
|
||||
CVE-2024-56463,0,0,c91a97955e67636097d6c8d92cc78e5f006b9381a4b58d350ab149902990ae2e,2025-03-03T17:09:36.020000
|
||||
CVE-2024-56467,0,0,4abd380d633d7d20b2a027f678c099ef3316a3d7b109e9e37281d916573a7b07,2025-02-06T21:15:21.600000
|
||||
CVE-2024-56469,0,0,8858433e3a23bbc4041cc9fa4ddadf0e8de10d95ea752f993edeb0505044f985,2025-03-27T16:45:12.210000
|
||||
CVE-2024-5647,1,1,35e045eecb6a46d4f46bc95209a8d422d50d15ca02c3d605eb8650a20bf7d23a,2025-07-03T10:15:34.527000
|
||||
CVE-2024-5647,0,0,35e045eecb6a46d4f46bc95209a8d422d50d15ca02c3d605eb8650a20bf7d23a,2025-07-03T10:15:34.527000
|
||||
CVE-2024-56470,0,0,61c48c46be39e45171a09013b345ebbaf36a8d1a6bbca7b2ab400aedf5fb9ae6,2025-03-07T19:43:22.887000
|
||||
CVE-2024-56471,0,0,c7151923658ce235067b1c50400ceb9bef48db680c4c27b5c059b231d4913621,2025-03-07T19:42:50.713000
|
||||
CVE-2024-56472,0,0,6604fd856b39fa8f7143d34738ec0b1262f2adc9500d77a6d6deea5160414bfa,2025-03-07T19:43:04.223000
|
||||
@ -279990,7 +279990,7 @@ CVE-2024-6967,0,0,ade39630d7d89b5294e6f3e3035932e29d3efa3a49897d16c57ba99237c4cd
|
||||
CVE-2024-6968,0,0,c3325d287badf88f2b7cae15e0f090374d46df3efe6e19be8c26f21177f73c7b,2024-11-21T09:50:40.120000
|
||||
CVE-2024-6969,0,0,f14240f2061fd36cac18ed34c9e5d94a47b03d6bf040b7fea56c093c809b2771,2024-11-21T09:50:40.280000
|
||||
CVE-2024-6970,0,0,cc97568a8d33b80b60a4d32c24c2dd28ea7944b7a0d263208b78c082cd80107e,2024-11-21T09:50:40.433000
|
||||
CVE-2024-6971,0,0,adb129d2d9800c044bf65449c2db09f224181ba2e09fd5a11ab005733e182e5e,2024-10-15T12:58:51.050000
|
||||
CVE-2024-6971,0,1,849f4429d1fa31db01ff8633ec74272a7dbd3fa5052916f8ec8c250073442de1,2025-07-03T13:39:58.133000
|
||||
CVE-2024-6972,0,0,9a86d51a11294b6fd5f180d7a9be3ebcfc22b4318686c127502b2528790a9c5a,2025-07-02T17:26:41.540000
|
||||
CVE-2024-6973,0,0,096d13427660ecfa8776773899d8b5d3f10ae6abd54d10f6817ea2e50d636bd0,2024-08-27T15:34:18.620000
|
||||
CVE-2024-6974,0,0,d0cc24f48e38a9d6ad2b33fba6995afabff942595247fcbcdc2d7af5991f7021,2024-08-27T15:36:40.667000
|
||||
@ -283511,7 +283511,7 @@ CVE-2025-0881,0,0,5e0512717b2e0e428e0b2edb41e4463f5ab58fd6fdc99dd6f82ebe9e86b1ae
|
||||
CVE-2025-0882,0,0,5c1edbc7dbbc3f98ebcedbafebdf2aeff716655934824b3ca1dcdd38b6a04fd3,2025-02-25T19:08:48.593000
|
||||
CVE-2025-0883,0,0,133677fdc2ba83aba4f58f830341ca4fb6d60b1a813064a6ce07d337274a8dbf,2025-03-12T16:15:20.353000
|
||||
CVE-2025-0884,0,0,81ba81b7c4f8494c1e6f5527e12a46e63af8aaf982c1f77f871a3be509f2c531,2025-03-12T16:15:20.523000
|
||||
CVE-2025-0885,1,1,931b3e0639c16822d120c485359f0b3af52b4a51e5310ea6315d6fd05536524e,2025-07-03T10:15:36.583000
|
||||
CVE-2025-0885,0,0,931b3e0639c16822d120c485359f0b3af52b4a51e5310ea6315d6fd05536524e,2025-07-03T10:15:36.583000
|
||||
CVE-2025-0889,0,0,3dc2bbbb613a47b35a5ae9bb49f5dbfe682e817feb6892e08df44d3133437acd,2025-02-26T08:13:09.050000
|
||||
CVE-2025-0890,0,0,68df14f89e9fe80a79d0a5c45e2ac7eb09be58559d3bae2cdceaf342154a05c6,2025-02-04T11:15:08.880000
|
||||
CVE-2025-0893,0,0,9aeacb99190c595b48dfab12a1ef373316d1268f2ba3ec63739da944f1088a1b,2025-02-27T16:15:38.110000
|
||||
@ -284190,6 +284190,10 @@ CVE-2025-1704,0,0,45ed10bd85c28150ffd6d9e18a4e608ac36e439afa1d7fa6e04c31ca92cc52
|
||||
CVE-2025-1705,0,0,269e355c7cfca537a526c588669165c0e79ec506469175122c59352a58fa4621,2025-03-28T18:11:40.180000
|
||||
CVE-2025-1706,0,0,dd52d06f7144d980c22c3ae884303aff0dbdae65eafe12989e3ba4c9649fb2b5,2025-05-19T21:15:22.120000
|
||||
CVE-2025-1707,0,0,eb806af042366277371dce5ba4e4d20eb3821597874c2eb4040b48171f171ef9,2025-03-11T22:15:12.583000
|
||||
CVE-2025-1708,1,1,ff6cb43fbd90d4ab19065a64f9bced1b53f7c15cae1ec9666883ea4f0690ea1b,2025-07-03T12:15:21.810000
|
||||
CVE-2025-1709,1,1,ffc84a29f2e3c8eaad20c23af564999671ce1af209d786fdf19f1397092e79c6,2025-07-03T12:15:21.997000
|
||||
CVE-2025-1710,1,1,54c67eca912dacc00448ae53bb3bbf06260375e20cb098e531c9a64ae552d121,2025-07-03T12:15:22.137000
|
||||
CVE-2025-1711,1,1,c4d637243b1c05e85b38608702703b5acc342504cbda9a580bbd8930b88b1798,2025-07-03T12:15:22.270000
|
||||
CVE-2025-1712,0,0,b94d0190ebdb3831769a5867dbc038d4d7585fa2490152c1e878c7d5a7044388,2025-05-21T20:24:58.133000
|
||||
CVE-2025-1714,0,0,6e67e5fe1ad7d1f8ea60e413f9fa7e7e2f63bd8d4c4369040436660c144fa80c,2025-03-07T05:15:16.233000
|
||||
CVE-2025-1716,0,0,7b54faf04c0c346ecfa632bdb4185fc3c19aff41bf7399ecadc1ddfb775e6d41,2025-03-03T16:15:39.520000
|
||||
@ -285023,7 +285027,7 @@ CVE-2025-21219,0,0,424604839da721e4da825bd88d64a2416b0606f77e8b9a1190e69289c7bcf
|
||||
CVE-2025-2122,0,0,bd0ddcb5c10a5424b014ae61e986dbd6612bfc3443db08969f8c2d2d7a18ee8d,2025-05-28T18:32:51.280000
|
||||
CVE-2025-21220,0,0,82564910421308f385255df4786cde1003db7381c932ced5ca5e270285456183,2025-01-27T18:45:48.310000
|
||||
CVE-2025-21221,0,0,ef3b42920d51375a26237b4a54347bbab4cdda69b7e241c6d7980b2500eb3621,2025-04-09T20:03:01.577000
|
||||
CVE-2025-21222,0,0,8864035f0bc92bf7b565257a31ae709f9aa885fa2fd3917160585807f574b0b7,2025-04-09T20:03:01.577000
|
||||
CVE-2025-21222,0,1,381a830d81ada5f39e3cd6c85ffa5c870608e9520050c15dfca1ccf36ae9db8d,2025-07-03T13:17:51.020000
|
||||
CVE-2025-21223,0,0,60b46abe07e24569b5150fc60453c8604d1695be1750a046f165ca749c1035bc,2025-01-27T18:45:59.727000
|
||||
CVE-2025-21224,0,0,524a61fa6a9bfe5f2cf3c7043f516491c6390506f3d95d973c1a50dcfddd6699,2025-05-29T14:15:34.507000
|
||||
CVE-2025-21225,0,0,43d8a26b699bf26bb564adf13e70126920fe623472670908dddd2c504a6cb0ee,2025-01-27T18:46:45.813000
|
||||
@ -285050,7 +285054,7 @@ CVE-2025-21243,0,0,47f3c7fdb1f8388df8473b12c4def680fb786309202939e1fdbdff3e7fe50
|
||||
CVE-2025-21244,0,0,8fb15ea0226862a5c2086f0f524884716b3904e26dd6182191fd12c6fcba414c,2025-01-24T21:53:59.660000
|
||||
CVE-2025-21245,0,0,f8977154881a23caac2cbfb367fae61be05ee6a5797e98c1fce578f1bb50e44a,2025-01-24T21:54:08.047000
|
||||
CVE-2025-21246,0,0,2355d5f1e5f99349a2c983a1867ed42b3be58a725316ed8d7e78af1b25b93990,2025-01-24T21:54:27.603000
|
||||
CVE-2025-21247,0,0,dbe35eb22c783e6b8f69312e3f3e346bcddb020d3800aef9c1ee88b5dd4133ae,2025-03-11T17:16:20.400000
|
||||
CVE-2025-21247,0,1,a29c7c776cbdbe8ab2498da0b33ec279b95b3fda46b17d51cc5d63e3f11b61a0,2025-07-03T13:41:26.107000
|
||||
CVE-2025-21248,0,0,5fec9176d3491513238c849ca9f8b98246abbf6bcab1978fcfceaa9a87899f2d,2025-01-24T21:54:19.163000
|
||||
CVE-2025-21249,0,0,cc0cd96bf402d287899c115acc983f6d8b986d6d0cc004dd6bff6ad28b81b32e,2025-01-24T21:54:39.180000
|
||||
CVE-2025-2125,0,0,0f7b0e6f8a3ceaacd83dde6eaf792c238b11766a7b3023faccd07765de49ca1a,2025-03-24T13:55:50.327000
|
||||
@ -285211,7 +285215,7 @@ CVE-2025-21394,0,0,b22cdfb350edb4fc8358a0af3095b89b40db351f307e4fe59c03d7516d837
|
||||
CVE-2025-21395,0,0,5cd1edb3661a78a92cbd38f88708e701e7ed88beb62be825aa61a7bf48b48da6,2025-07-01T17:01:26.540000
|
||||
CVE-2025-21396,0,0,829f987727bcd0beec5fb26a54fd5adbd2c578e1280e256f4b663128bf9e1d15,2025-02-12T19:15:20.880000
|
||||
CVE-2025-21397,0,0,ff8dc05c8dcabccdc2fa1fcc47686f2d44cb68336286bf61f85feaadaf52bf1e,2025-07-01T16:49:00.143000
|
||||
CVE-2025-21399,0,1,4a047a987e9f92838e03a6a2b492eb2898e761f85e9487e594c302724a5aaf40,2025-07-03T11:22:24.480000
|
||||
CVE-2025-21399,0,0,4a047a987e9f92838e03a6a2b492eb2898e761f85e9487e594c302724a5aaf40,2025-07-03T11:22:24.480000
|
||||
CVE-2025-21400,0,0,37ed4978ea5ff59167ade9649ace31aa58a0e6b82c1ee4595bd48b77955a1c26,2025-02-14T17:37:31.690000
|
||||
CVE-2025-21401,0,0,2f5f679382d0bde69377ea4c16a0ebaa6242875ae77c22a88df3e1261122c231,2025-03-05T20:14:45.310000
|
||||
CVE-2025-21402,0,0,50bdf907bfb2678b17fcbbcf222749ada785020f895cf01f5f957d6360757277,2025-01-27T18:34:23.127000
|
||||
@ -287642,7 +287646,7 @@ CVE-2025-24031,0,0,f001af7155fa77b1de37ced441ee4e39c1454b911ef9ca1ee83e5bda55f8d
|
||||
CVE-2025-24032,0,0,1178a4dc66e28f37c78bc3ebc36c9a48c540f3ad31de8ebddc9029a3c39156bd,2025-05-21T16:15:30.827000
|
||||
CVE-2025-24033,0,0,5d43b3fda302d539504b19a83f0cc15d137062f506c15ff024403b0f87c197d4,2025-01-23T18:15:33.610000
|
||||
CVE-2025-24034,0,0,0513aff0d67a6ab3e752cdbedf94272062322edab521c53d56f2829172c813e3,2025-01-23T18:15:33.793000
|
||||
CVE-2025-24035,0,0,208d442b98435f4e3be0533a3adea270fb143e10c5121aff6ac7a7315d3137b8,2025-03-11T17:16:25.373000
|
||||
CVE-2025-24035,0,1,cb7ce026b8c6d1f2e6e2033c8cdc603aff6bf3ed18b68b3cb774c6f99c4b7019,2025-07-03T13:54:34.513000
|
||||
CVE-2025-24036,0,0,fd3c57cd706b96e46ede143d602a78012ec65a6099cd7b40520437f8a49a1d2e,2025-02-14T17:31:47.153000
|
||||
CVE-2025-24039,0,0,4d28f6dbd3596cbed15c2148cda69ce9af433dfe231f6a88e6532d20d2b0a833,2025-07-02T17:13:40.477000
|
||||
CVE-2025-24042,0,0,fa5b58e27d84985209c29bc9392bcb6eff9ea6341eb01b8f6fa6fcf07a3f654b,2025-07-02T17:15:25.457000
|
||||
@ -287661,9 +287665,9 @@ CVE-2025-24056,0,0,1c27a575a8ef21f3a75bcbd90eeca43c7edf6ec095e0589d320455cb20026
|
||||
CVE-2025-24057,0,0,1c16719b50db69ec5aa6d4c80f47375d9c33837d6d755b2c98c99061d2778b49,2025-07-02T15:53:18.160000
|
||||
CVE-2025-24058,0,0,611321e1e73a14eef4b696cafe61888e53ac8a1f6af4b8c8f37b6d6f34a1223b,2025-04-09T20:03:01.577000
|
||||
CVE-2025-24059,0,0,1bc6c6bab972f1f4008d308b3ff5989d19497281b4143dbfcbad5e893def1cef,2025-07-02T15:48:47.580000
|
||||
CVE-2025-24060,0,0,b504772137ae4b0f645752b4481e1b49b463b1072eb5b68447459d037589d168,2025-04-09T20:03:01.577000
|
||||
CVE-2025-24060,0,1,0923cc9abe1a38a26479c9013c5238c4999c5703aa134c5b57d5f5103947653a,2025-07-03T13:09:11.443000
|
||||
CVE-2025-24061,0,0,431ef0686734d1b74dcced2d71c1a26e1f54277ac21e77eb5b222932d93e4766,2025-07-02T15:46:38.697000
|
||||
CVE-2025-24062,0,0,cabb29da22470c3599c0329336c056dd9a5b4f7cd3ca7edd1a0c02fb1c312923,2025-04-09T20:03:01.577000
|
||||
CVE-2025-24062,0,1,3c1a8c3531bf7b078f59e99105e89fb25382d3d7f97731a7989d1b2cb9e52a03,2025-07-03T13:07:14.593000
|
||||
CVE-2025-24063,0,0,fec2a9feb349eff190a599709c0adf8e2e813f7b6a6047359eeb483ba241f53d,2025-05-19T18:23:57.450000
|
||||
CVE-2025-24064,0,0,6dcd7316da816f3e196970c900f3891a9af97c3ea3685a184c692391f6f101fd,2025-07-02T15:08:54.147000
|
||||
CVE-2025-24065,0,0,2083ecf1a51af949c0536c9499d4c1a895d4ae491fad60eee6de07c01100bb4b,2025-06-12T16:06:39.330000
|
||||
@ -287673,10 +287677,10 @@ CVE-2025-24068,0,0,7a721e7a212031e78a2f6b3db4609e6d2977cc64d8d3e08218f8a08452f26
|
||||
CVE-2025-24069,0,0,19556b6c7b436792770b31c579890806fce0d6ca59ec7f01c5bcdd49024bec01,2025-06-12T16:06:39.330000
|
||||
CVE-2025-2407,0,0,21e602e5f9293dc5b926b2bcd858886585bd73dfbdfdae3fd03d8f092b288eaa,2025-05-28T15:01:30.720000
|
||||
CVE-2025-24070,0,0,3b2438db3d9bde03550b15f66ef9bbbeb06b8fdb0fc50c9b8ad59ce96b3ba31a,2025-07-02T14:25:46.603000
|
||||
CVE-2025-24071,0,0,937e664eb80922cfe593897847de35569c90602f40294027181c05737e712c25,2025-04-16T16:15:29.953000
|
||||
CVE-2025-24071,0,1,09beabf0ea1eacb8a241163bca8e597ef799b9a12e8eb51c6ed950024f448bd8,2025-07-03T13:23:25.997000
|
||||
CVE-2025-24072,0,0,dcc28ddf88e5a6c17097ca6c12ca53cef0e86857de759c2126d6949703c7f123,2025-03-11T17:16:30.070000
|
||||
CVE-2025-24073,0,0,3c40e074907acac047519aa2655708b7f72eaa99bea41c52a1d84e1b8613e546,2025-04-09T20:03:01.577000
|
||||
CVE-2025-24074,0,0,a4a35fa570decd3996cfd498dd5b3b8a8899d67dfeca71f44f403d94ad0bce7d,2025-04-09T20:03:01.577000
|
||||
CVE-2025-24073,0,1,2ce950855e036572bdf1b5168b88753d44688143e458dda52f5120aabc24507f,2025-07-03T13:04:30.673000
|
||||
CVE-2025-24074,0,1,38d354e07de68d8d5a67ed5389fddf6100244b9c13a1f7e2ee950a1c9961502c,2025-07-03T13:03:00.923000
|
||||
CVE-2025-24075,0,0,e1439e99cd6e80b94161ca4c108bb44d05b9e2a54cd61fc6da56cb6014105352,2025-07-02T14:56:16.393000
|
||||
CVE-2025-24076,0,0,5f6e02a1a3c83b4dfc5002327031bc10d5e45c77892b582ec81598e32b3dfd1c,2025-03-11T17:16:30.480000
|
||||
CVE-2025-24077,0,0,cca3d2feb2cdd17f822fdf1dfacf11a69bcb2eefab6ee159cbd8498fa01cd4b1,2025-07-02T14:31:02.807000
|
||||
@ -288755,6 +288759,7 @@ CVE-2025-2536,0,0,6c8f59f7c1397de65b62b4e0ffba855ba6e95346e685349bc06dd79321df74
|
||||
CVE-2025-25361,0,0,ab5487e6525fba97cdaa6e1a0f8b716e301d7d8c84bf950dd0be8f38acf86242,2025-07-01T21:23:28.040000
|
||||
CVE-2025-25362,0,0,9160a912ca56a1054e5859a92806843225ad5b9f9e234071c901687ebe5f3620,2025-04-02T13:15:44.063000
|
||||
CVE-2025-25363,0,0,43354a7cb9bff3855f8f3fb76446678d9f4fbbe0b63ea75c7bf197f67b82fb32,2025-04-03T16:43:59.040000
|
||||
CVE-2025-2537,1,1,0cd192d7a9ee9a7305da37b985bb43e14425fd90b813587ae73b31a606f56917,2025-07-03T13:15:27.337000
|
||||
CVE-2025-25370,0,0,0004e75a70fb8fefe15298fe8d144dfc437806874eaf1f1e5fdd0c34aa1ae94b,2025-05-16T14:43:26.160000
|
||||
CVE-2025-25371,0,0,049c632b58d7029c04da8590c580b34984ba285f838086506b2cd37871e62996,2025-04-03T15:17:54.413000
|
||||
CVE-2025-25372,0,0,240bc71dd84dfac32c47fb199d651cb3e67f8af768bdc10c675ee6797857fb7b,2025-04-03T15:19:21.277000
|
||||
@ -288768,6 +288773,7 @@ CVE-2025-25387,0,0,8b1f30ada278980cff112366182e1045802ec3725274b1349a46d716a755f
|
||||
CVE-2025-25388,0,0,fed53807b7da6020368046541547825f245ba9643c2f8971291be1eb79ad608f,2025-03-28T18:35:33.217000
|
||||
CVE-2025-25389,0,0,371b3f95240b6264fc59e923897a56d5d3224aa7b2c08ea9bdb427a39ad96e68,2025-03-28T19:04:10.523000
|
||||
CVE-2025-2539,0,0,d08575a7f1943ad408e267113207b31d934ab07db617ed66f8aa571dc440dc3c,2025-03-20T12:15:14.900000
|
||||
CVE-2025-2540,1,1,e1308351fcc9bd10bb0ce271eacf064309bdeaabd892ad39910e6ed7cf84e818,2025-07-03T12:15:24.483000
|
||||
CVE-2025-25403,0,0,0d231ea68090ad249aec4fb809acb9214a05b5a8286dff9de6dea9c4c4a4b723,2025-05-06T16:15:27.753000
|
||||
CVE-2025-2541,0,0,8b40d977637776f3c1ad0d2a3abc23dcbbe36312db577f03daa69ece2feadda8,2025-05-06T14:09:58.370000
|
||||
CVE-2025-2542,0,0,051c9ac38dc3845e54472e78eedda96552f7a8993cf83d4a7f290489b845369f,2025-03-27T16:45:46.410000
|
||||
@ -289363,9 +289369,9 @@ CVE-2025-26630,0,0,af7d7e5fa840c887baf50d5c1735f7aa1619e17d1764c67afb65d807890e6
|
||||
CVE-2025-26631,0,0,59a2f45a7814bc8caf629a43c5f1ff123b906077fc8e25801290af954c09035d,2025-03-11T17:16:43.110000
|
||||
CVE-2025-26633,0,0,f4fbb84f465c1b0e951baaa78ae863528d201e071a3830aebe9457a9de1e838d,2025-04-17T18:29:29.283000
|
||||
CVE-2025-26634,0,0,d22a5c86c7b5db45d07a44ad1b8782a92b44e38e67933bfd5a6de19940b0df53,2025-03-11T17:16:43.743000
|
||||
CVE-2025-26635,0,0,3792f1c25dccdb52d204387680bc2fdc9d5aaea2111f262a0da5933377624ed2,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26637,0,0,facb86eb6dc56d63e108cb97f115aad5d62cbcee321419d10e76d6c3d9c8a438,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26639,0,0,5a598a3d7167ad8e3e2162afa32507bdd3597eda5bafb5d1eab6579f81980c84,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26635,0,1,33816bd7e0fa13543b0349e255a8a88015ad8892d885ba88a4a1f65125e9ea6f,2025-07-03T13:00:05.107000
|
||||
CVE-2025-26637,0,1,99e41170116e1f2746fd437fd212973171e7fda09083183b218f876996c16b90,2025-07-03T13:03:14.377000
|
||||
CVE-2025-26639,0,1,71f35ca4441fe1279986f77456f7b0154238284043dc5dcb7be6b6a0c1a03964,2025-07-03T12:49:59.027000
|
||||
CVE-2025-2664,0,0,7dd3532ba78c5ad5d0e6ad7993e1592577cd1539408ceb32db3e6a76007c157c,2025-05-13T20:10:57.580000
|
||||
CVE-2025-26640,0,0,ab2bfce98ad0243a51d62e6162825a3b64aa3f227497daee01c8cf40577252a9,2025-04-09T20:03:01.577000
|
||||
CVE-2025-26641,0,0,6663f8a26f594a769c537befb4f3e590fbe0e63bee66eee30beccbdb4ee126fc,2025-04-09T20:03:01.577000
|
||||
@ -290015,8 +290021,23 @@ CVE-2025-27442,0,0,3da2fa991b1fa899731d47641052ab04d437584548e9c485460b64214e501
|
||||
CVE-2025-27443,0,0,ccd5fa9501bd1c4c89d386363f67b3971f9105cc14cdb667513fb78e12c76ecc,2025-04-08T18:13:53.347000
|
||||
CVE-2025-27444,0,0,4a47feecb17e273ada092c286d134005100fd80febdd86293ecde589498b8bab,2025-06-09T15:04:33.780000
|
||||
CVE-2025-27445,0,0,b3f5f26acd9b1eeb391c632e6a4f22f7ea880cf9f07dc106f61ff101a1eb24d4,2025-06-17T20:15:31.250000
|
||||
CVE-2025-27447,1,1,7823e8acb62259963e318a2d14cd25abaf844762d1d502e5ec603c3abad693a2,2025-07-03T12:15:22.407000
|
||||
CVE-2025-27448,1,1,2f456385c5ff0e8ec5596725f7c69bb8e96d9b7fa64f539dc38f1804de422f58,2025-07-03T12:15:22.547000
|
||||
CVE-2025-27449,1,1,1f82812c2e2abb2a251f7c030912c06b09530061975e271a347e8ec8ac5fe083,2025-07-03T12:15:22.687000
|
||||
CVE-2025-2745,0,0,f2e2b47141a7e3198a73a4280ef79923cff913dc2fab9a868b423d54a6a875df,2025-06-16T12:32:18.840000
|
||||
CVE-2025-27450,1,1,ecb2c4adb981760419e88e273adc74cda11a6439807577f0eb97ecac0f0109c6,2025-07-03T12:15:22.817000
|
||||
CVE-2025-27451,1,1,ec186c1ddc778ca2291c811474128c9dabc23880a8139e2b65ff6b16c40afec6,2025-07-03T12:15:22.960000
|
||||
CVE-2025-27452,1,1,956ebf09b34246b44eb6f02463ccdf7ef31e6fa8620e6fb7ffafeeb5cf028efa,2025-07-03T12:15:23.100000
|
||||
CVE-2025-27453,1,1,55864b0f18a6457de2d4a94f92bd3a018fa9a86fcb694323f007d7712963cf8b,2025-07-03T12:15:23.240000
|
||||
CVE-2025-27454,1,1,4d566eb6ac20252a4a6dbf56b691347f01ee51536fe0a02b32ee7c2518c53561,2025-07-03T12:15:23.380000
|
||||
CVE-2025-27455,1,1,d3b6f7033c331508d4a4829031b496a47c1af9e291de6211ba801a56cd513b88,2025-07-03T12:15:23.520000
|
||||
CVE-2025-27456,1,1,5f9d5514b1534ef88bd5d1b949dd64edb4827f38771d28fc6d9390991c58e532,2025-07-03T12:15:23.660000
|
||||
CVE-2025-27457,1,1,c10baf8468d907e9bb9e95a54638c534bc77c8ce76e4928175d1baa895acd366,2025-07-03T12:15:23.790000
|
||||
CVE-2025-27458,1,1,2fbb6ae6b240ac99c40867829a3c1f889af3732d595321594e857fa646ce5772,2025-07-03T12:15:23.917000
|
||||
CVE-2025-27459,1,1,a1ee44ac341a87c7f0a8de9b231f876d9a9e9ec7987dee43180c5ecf29125357,2025-07-03T12:15:24.053000
|
||||
CVE-2025-2746,0,0,71c2d17f9a5c716435e405e404de90f26a63b0f3426fd27a8f85b67d8ccfbefe,2025-03-27T16:45:46.410000
|
||||
CVE-2025-27460,1,1,4858fff9a0e58c795e303cc845fd111c7ec61eb22e1ef311be102e44cef4a6ba,2025-07-03T12:15:24.203000
|
||||
CVE-2025-27461,1,1,b23a51f27727c0fb217c900573cc31521d2738408ac6fe8aa3763eb00ff461a2,2025-07-03T12:15:24.350000
|
||||
CVE-2025-27467,0,0,e305051e1a7dcf4291e11b8cd6f3091788c2ddeaf29bee2cf92ba70db3a6a044,2025-04-09T20:03:01.577000
|
||||
CVE-2025-27468,0,0,dcaeee6f5e39787f02f391b688449bc9e36259b88e853d225eb70b8e9394d505,2025-05-19T18:22:00.040000
|
||||
CVE-2025-27469,0,0,d1791d98ff61ccd8817317ee4f085d2157d176aee03e5478506034a9cd36c6cd,2025-04-09T20:03:01.577000
|
||||
@ -290797,6 +290818,7 @@ CVE-2025-29313,0,0,36b5dfbaccdc259f2b52ceac76431ece1292ff6ced8c88ea82c0057012874
|
||||
CVE-2025-29314,0,0,68cd136edb649d9eb6aec698b8b31c836ad747d7f35cb5e1d05f8aa177ad8f88,2025-03-27T16:45:46.410000
|
||||
CVE-2025-29315,0,0,f907f053863754eafc89ac11a469f54443f6b549eee8182288b1596f75ccbd29,2025-03-27T16:45:46.410000
|
||||
CVE-2025-29316,0,0,edbfef5d2b6ba20f5ddacf4404f4ebf4c89ebe5fca32750f4069bf616e710afc,2025-05-05T18:15:41.723000
|
||||
CVE-2025-2932,1,1,3d66f20c8f7da09396fa5827329005ae5a7c5a90dd9ecb167ad0e0643c44c6f7,2025-07-03T13:15:28.220000
|
||||
CVE-2025-29322,0,0,2d154ec4512c8c4d705799afa2ea73c17ca8f22a9dcc44f2fe16f737f7f4c5a2,2025-04-08T19:15:48.650000
|
||||
CVE-2025-2933,0,0,d2bf8266af3293189f2fc83d9c7224df7d9162ddc33d6ffbeb12c1b55081638f,2025-04-07T14:17:50.220000
|
||||
CVE-2025-29331,0,0,ff4bf30af6256a3d3fc44e51c91da0db8b95fba45c76b4cf71ca3b325283f387,2025-06-26T18:57:43.670000
|
||||
@ -294182,6 +294204,7 @@ CVE-2025-3696,0,0,7fdb9b0cabe429a7d591b9514cc5a2b8602875f81b912338d2415db3302af1
|
||||
CVE-2025-3697,0,0,016a36f864524accbafaf295ad97be566b6d7d71f4f9f5814923e821cb7e35f1,2025-05-14T21:05:11.930000
|
||||
CVE-2025-3698,0,0,3410d174ae31c43abb68f418121b89dca3911c4e48575a9281b05507afa201de,2025-04-23T16:25:56.830000
|
||||
CVE-2025-3699,0,0,d02a1cd04c24f3e630d7aa0838897d4c7fa576fd6ceb0be9ab7fddd90a36396b,2025-06-30T18:38:48.477000
|
||||
CVE-2025-3702,1,1,507e58e195e0935ee8ed5f74ec7b7007d78d722be03a5ba94cde3e31507165fb,2025-07-03T13:15:28.387000
|
||||
CVE-2025-3704,0,0,fa4a3eb7f97cc05cb29111ef6884110e54a213e5cd6aeb5d02530af4ecd14db2,2025-05-28T15:01:30.720000
|
||||
CVE-2025-3706,0,0,af36967002cae35edc22a037b5e4639098ca61a00f66dc40237f6cb847234a6c,2025-04-29T13:52:10.697000
|
||||
CVE-2025-3707,0,0,19f2a3789a7c8f868baebd7065af2264b477a736f48157fc6f27b30ec7dd06ec,2025-05-07T16:50:32.967000
|
||||
@ -294993,7 +295016,7 @@ CVE-2025-39493,0,0,545039d4771a67dd4187952a4dc4f19c2fa274a7007f04d5426f2bf8c6d04
|
||||
CVE-2025-39494,0,0,17f21d8aff8eceb67919fc99c805408298f2506319db4548074f4e9ee7370a3f,2025-05-23T15:54:42.643000
|
||||
CVE-2025-39495,0,0,777dab53f8cea7e4a2b42375d0685a3376acecaa8b2117a01a1d06aa0095d084,2025-05-23T15:54:42.643000
|
||||
CVE-2025-39498,0,0,dfe300f3baad9b96791675af61946710b302c58702c4771e2b52bced0ed375b4,2025-05-28T15:01:30.720000
|
||||
CVE-2025-39499,0,0,152f3704dfd7c07ad802fbdade5841d0b5e5e37a6a711803a46d1b59669e9c05,2025-05-23T15:54:42.643000
|
||||
CVE-2025-39499,0,1,970e925794fb3c0c15e3c0b046d7250a5527b05606ae90a1dd14a5f8abe3ff0c,2025-07-03T12:15:24.660000
|
||||
CVE-2025-39500,0,0,b29618f36bfc17c698faf0480a5f4d9787f9940c5b23d96490290706049a04d3,2025-05-23T15:54:42.643000
|
||||
CVE-2025-39501,0,0,0d0145286d32710274b9dcbee9f98781d1d0a2628cc4e2f31a43c6cbe6caa229,2025-05-23T15:54:42.643000
|
||||
CVE-2025-39502,0,0,185001573147da6c3f67fc2a63f851317b24ffac1e747591abfbe4b622115161,2025-05-23T15:54:42.643000
|
||||
@ -295287,6 +295310,8 @@ CVE-2025-4070,0,0,95239c8a358b05c88e31535f0df25ceb69331749309a950b338783db563363
|
||||
CVE-2025-4071,0,0,68547b4133937980d039f29a0abcfa60e8d56aeeed72b73dfe6880158fc5f6a5,2025-05-09T13:51:10.523000
|
||||
CVE-2025-40710,0,0,8cc40467f9da3b7395c12c0e98b870c50c26f86bd267d1a0458e9c8626fe5b97,2025-06-30T18:38:23.493000
|
||||
CVE-2025-4072,0,0,d0cf8b7d2285b873c553b1cc40373ece79b00a96b5dd7782b5277899efb2c1fa,2025-05-09T13:51:19.130000
|
||||
CVE-2025-40722,1,1,4d3e8deaddd4a796784366ed170411858499b7c1dadd18922254ead9d64d74c7,2025-07-03T12:15:24.777000
|
||||
CVE-2025-40723,1,1,d1a7d8e9a59f1f6e4a058151d3144ae63013cb89c8b2894af68f3363126d5b43,2025-07-03T12:15:24.933000
|
||||
CVE-2025-40726,0,0,06973151ee6645a9d84113341fb6a06b6153e8d65c35cf71d204b0fa7561f372,2025-06-16T12:32:18.840000
|
||||
CVE-2025-40727,0,0,2df5ca63ef8e4109dd8647b45a130fc57acc0369c9ce97676942524e407d7e38,2025-06-16T12:32:18.840000
|
||||
CVE-2025-40728,0,0,bdb76fd49b6306a75f42baf3d308e3134ca65ae5d1359edce01c72fe50aa6cd7,2025-06-16T12:32:18.840000
|
||||
@ -297170,11 +297195,11 @@ CVE-2025-47550,0,0,629dfc1b5d3dae27c215f668b417f5d7d77b81c396c5312e859726ef80f60
|
||||
CVE-2025-47551,0,0,1ff47bb4d657c7e33aa1dcc67f35e113ebaf811e1c3c764c0a360a72784cc1b2,2025-05-08T14:39:09.683000
|
||||
CVE-2025-47556,0,0,06063b9894785c3f6de11ab2418874bc9eef693faf7cbeeae3efc54dd06a8e64,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47557,0,0,30fe5baef7cb4352c2f9471d036fd77d02b114de359294a33b494a876933071c,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47558,0,1,dc7c7ebfb00a242167d62e603c913340fcd05c5e30cae669fe8ec8dd520d8398,2025-07-03T10:15:37.073000
|
||||
CVE-2025-47558,0,0,dc7c7ebfb00a242167d62e603c913340fcd05c5e30cae669fe8ec8dd520d8398,2025-07-03T10:15:37.073000
|
||||
CVE-2025-47559,0,0,c452af870bfcf27cd44e9434d8eb5828a91a2cf468eb5b9799c2137a94413715,2025-06-17T20:50:23.507000
|
||||
CVE-2025-4756,0,0,b935e91bacb1926bc8cf1fe1b0f1de476b8b7bfbf44789827c7a23f8c6f1b349,2025-05-21T13:40:10.450000
|
||||
CVE-2025-47560,0,1,7a3a3e939d15203255a990ebbf889f25240a702f9dcfae7860224ccbf640f83e,2025-07-03T10:15:37.290000
|
||||
CVE-2025-47561,0,1,8b050526c8237fe36193e74cf309358734a02806bb21757e1cf72a029c892fc1,2025-07-03T10:15:37.560000
|
||||
CVE-2025-47560,0,0,7a3a3e939d15203255a990ebbf889f25240a702f9dcfae7860224ccbf640f83e,2025-07-03T10:15:37.290000
|
||||
CVE-2025-47561,0,0,8b050526c8237fe36193e74cf309358734a02806bb21757e1cf72a029c892fc1,2025-07-03T10:15:37.560000
|
||||
CVE-2025-47562,0,0,879496304ffa94481070c08ba70f4beeb80850bcaa0cd491262f65c2fe9f8f35,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47563,0,0,72acd05048e66bf43174d423048963fa4336cfd5d05a950e28ccf6a586953f28,2025-05-19T13:35:50.497000
|
||||
CVE-2025-47564,0,0,758c7c233976a079425cfa725a742dd6e7231873de27eacf12a1e47dc13257f8,2025-05-19T13:35:50.497000
|
||||
@ -297968,6 +297993,7 @@ CVE-2025-49015,0,0,7053466c08c4891a02644e52459d864d2976bc488bee7466751ae1ff71f25
|
||||
CVE-2025-4902,0,0,6a78a99defe072cc999de50623b42fd325c4fdcaf44bc58ff1a0ab5edd3f00ae,2025-05-21T13:37:47.987000
|
||||
CVE-2025-49029,0,0,5ea6b8c3d47164b1e3da159f46ab0088b574ac9e7a6b526578acaf6f1b4a00d3,2025-07-01T14:15:39.750000
|
||||
CVE-2025-4903,0,0,69886136439184589d2514a03e48b62487582f2c9800b08c9aef0c9095fac7f7,2025-05-27T16:29:52.787000
|
||||
CVE-2025-49032,1,1,f4b39df9f1cabc31af5475efbb6f27c042e6ea2d8a13ce15454775e1b0270f70,2025-07-03T13:15:28.540000
|
||||
CVE-2025-4904,0,0,d7b6b9c62b4fa4e81411d46fa975a661fdf9f9acbbbf9c59e6a55eeb063418e5,2025-05-27T16:29:33.560000
|
||||
CVE-2025-4905,0,0,a728b2ff467169e1f6cf1672262b598f366083759e672954b1455cf9374eb04c,2025-06-12T16:26:43.030000
|
||||
CVE-2025-4906,0,0,9067f7b753e109ce29b812a4f41ca825ba7ff1d4ba914b271b4c49b49a105e4d,2025-05-21T17:33:25.100000
|
||||
@ -298273,11 +298299,13 @@ CVE-2025-49590,0,0,6410f06ec304c33f7de38e60542df48b4a09e5727b2bdf61558440838b748
|
||||
CVE-2025-49591,0,0,8213a0ac33228fc66de183230aaf14b3bb926441c7720d7257b08485e909c858,2025-06-23T20:16:59.783000
|
||||
CVE-2025-49592,0,0,a8e89cf7ff683736c38e07e14239d04250c1884f43a43178551aaf1a21974b07,2025-06-30T18:39:09.973000
|
||||
CVE-2025-49593,0,0,6d7381d4ff0f4b81807be7ac3e78832aa1c2958239dda39de56e3e5b443b96da,2025-06-18T13:46:52.973000
|
||||
CVE-2025-49595,1,1,6935d0da48a6231427284038936c109a16f054c360464822e8bd5b0f5b54591a,2025-07-03T13:15:28.690000
|
||||
CVE-2025-49596,0,0,914f35572c3497727ef5bfdff2cd9e17d27812703e06d7a6c3496156238c7e41,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49597,0,0,31430be1a672877ef5712ae64cc63468a339d903aeb2a4d86bb312578783d5a4,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49598,0,0,388fe7ea425620c97395f0a980692153036c5ee134fd73303c8f32af7dfdea32,2025-06-16T12:32:18.840000
|
||||
CVE-2025-49599,0,0,cd0748db942732a0e968c564ce05d560bd51611e52e8cb06dc26ca9e65d8d9b0,2025-06-09T16:15:46.830000
|
||||
CVE-2025-49603,0,0,2c83b1b54b9e0ccac544fcbf8853e5ac6560c220daeb26018469e7c8d54de886,2025-06-26T21:15:28.150000
|
||||
CVE-2025-49618,1,1,f606af7c9b43224ae5344a1cef7a0781df83abed25a7ed82fd555ed70f00f19c,2025-07-03T13:15:28.860000
|
||||
CVE-2025-49619,0,0,34a674efa79bca2e7a9fcbbfc8a71e4ddf39896b0ede59561baed790959985f3,2025-06-17T21:15:40.087000
|
||||
CVE-2025-4963,0,0,bcea30a5657c56e720740d0c1da3f6ecccc2ea27495c62c19f4e987237e46939,2025-05-28T15:01:30.720000
|
||||
CVE-2025-4964,0,0,9a4175fc819c8903aae087508d79cb283240d351bb7e4f3f9bd0bc9b58a9f683,2025-06-06T14:07:28.330000
|
||||
@ -299940,7 +299968,7 @@ CVE-2025-6547,0,0,308fc321cf1c1a3e1d4bfaae0194d79b5c51460bd5056b984e695544d81bad
|
||||
CVE-2025-6550,0,0,fb64cb2731bfe62fcb701e0148808a0bd737d54903b1841bd8460bed4aa8b411,2025-06-30T18:38:48.477000
|
||||
CVE-2025-6551,0,0,9449985e7a9055bc84479e0b0f2b57fed721bbaf75a59a8d5b22bb237a895a0a,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6552,0,0,8717beff1ed0b4c67a4a3bc77f60be53e5be3c4b231cbc45b02cbdea4703f774,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6554,0,0,0e16f71f523606ebdd96299934e2fb36c330ac7a0054bd130a814c1710e4daf8,2025-07-03T01:00:02.480000
|
||||
CVE-2025-6554,0,1,76e14a93eb6268c34a5b3cd2197d5af9d4e547d9f1829b16de1a68179299000c,2025-07-03T13:37:28.153000
|
||||
CVE-2025-6555,0,0,f4d795313bf162cf12535912f4855954a037cdfadea7619dfbb980dbbe1e4399,2025-07-02T17:15:52.943000
|
||||
CVE-2025-6556,0,0,5dd6ab44298575dd6ea72ab64bd2e135767219dedcc87018eaedd80507778a62,2025-07-02T17:15:28.177000
|
||||
CVE-2025-6557,0,0,659e4c69a9210dd453974d2011009d055f369e3ef1b58ea4fc00ce7bd02e001a,2025-07-02T17:15:00.073000
|
||||
@ -299948,6 +299976,7 @@ CVE-2025-6559,0,0,9cb71ac3711fb3b86b569e9a51eb156c4586cc1e2e8b0bcfb406579e47f4c3
|
||||
CVE-2025-6560,0,0,0fbeb242211a22ef947f1fcdbf6b0e2a9cc7c2add8384266780a00d3eb1ea522,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6561,0,0,83d61226b99ac74707dce5abf1d8af5092a5760229e6f24fe4f0f3e682784967,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6562,0,0,fcfea14579c71c21a6c3fc7d5a6452ec3f1bf58bce45fcf51ede3f433e3f3646,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6563,1,1,0847ede4a8b8f592aa213bd56f627972fb434e9f12d47147be4110b7d6556ac6,2025-07-03T12:15:25.077000
|
||||
CVE-2025-6565,0,0,edbd540d511b85519129c288260b1fc37f33ec2182d67f9f0be78d5a0f7f9423,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6566,0,0,affe36b1d137bfbb12f982c13c1f5a07ceb2d195d5a802635829756c7ce109c5,2025-06-26T18:58:14.280000
|
||||
CVE-2025-6567,0,0,14a2a071a0db80b9d7b89b6f2738bddcf0dd4b44cc731a017fe21ac626971c3b,2025-06-27T16:48:39.390000
|
||||
@ -299960,7 +299989,7 @@ CVE-2025-6580,0,0,14c9a21bff52d8562deb8a5ff102203adfe298df563381633ada51bbda9d23
|
||||
CVE-2025-6581,0,0,9eb16713b89b10d47a3355e63f223e1d1babaf81dbe3bf267fcf583104bec561,2025-07-02T17:11:46.147000
|
||||
CVE-2025-6582,0,0,06b49d50890d886846d052750b63a829a4a61d16f96e10b0780325588b187412,2025-07-02T17:04:36.247000
|
||||
CVE-2025-6583,0,0,30d0558eb9467ec1d68b23c75a699e90fa70f2c3c0ad5646089f1aba65b21e55,2025-07-02T16:46:47.320000
|
||||
CVE-2025-6587,1,1,30dacd6c4f1f6f55c0698c334a1a03eb44134ed7c5c90aba7d874f63d1a2c9f2,2025-07-03T10:15:37.773000
|
||||
CVE-2025-6587,0,0,30dacd6c4f1f6f55c0698c334a1a03eb44134ed7c5c90aba7d874f63d1a2c9f2,2025-07-03T10:15:37.773000
|
||||
CVE-2025-6600,0,0,18c93ff99719c5ec48af9738d3a033a9b63899c35f7a554b2af99bb79dcf44c3,2025-07-01T19:15:28.003000
|
||||
CVE-2025-6603,0,0,94e8918af653fece9803c6dda129968de5b58a553aefbcdcb849847b69658ab4,2025-06-26T18:57:43.670000
|
||||
CVE-2025-6604,0,0,96d4dfdd3e003ea63aa1e4bba18d79cbe7cea5abcd4dc3ee0391b4f83c2246d2,2025-07-02T16:36:48.957000
|
||||
|
Can't render this file because it is too large.
|
Loading…
x
Reference in New Issue
Block a user